Security guide for PI 7.1

Hi all,
Can anybody tell me if there is a security guide available for PI 7.1 ?
regards,
Loveena .

Here it is
http://help.sap.com/saphelp_nwpi71/helpdata/en/8c/2ec59131d7f84ea514a67d628925a9/frameset.htm
Regards,
Prateek

Similar Messages

  • Security Guide for Enhancement Pack 4 for ECC 6.0

    Hello,
    I am trying to analyse the impact of applying Enhancement pack 4 for ECC 6.0, Can someone help me find any security guides for it.
    It is an existing system and few additional modules are being implemented.
    Kind Regards.

    Hello,
    We have applied EHP4 on an exisiting(running) ECC 6.0 System. Can someone help me find answers to below queries
    a) What is  the SAP standard process to start with Security bit.
    b) Do we need to run SU25 steps. If yes, which one of them.
    c) Since the purpose of applying EHP4 was to activate few set of new business functionalities, we intend to affect the existing security design at the minimal. What is the best approach for this.
    Kind Regards,
    Abdul

  • SEM-BCS authorization or Security Guide

    Hello,
    Last year We went Live with SEM-BCS Project.Now We need to restrict all the t-Code's in SEM-BCS. During the Go-Live We have provided  Full authorization's to everyone.Now Auditor's are bugging us to restrict the access in the SEM-BCS system.If Possible anyone can provide authorization or Security Guide for BCS Project
    Vijay

    Hello Again,
    Guide Contain's Only Authorization Object's & Default SAP Defined Roles. But Here it a different Scenario. SEM-BCS team has provided me 30 T-Codes & I am supposed to Pick all the Default Values for all the T-Codes.
    I am doing it from T-Code: SU24 & Updating it in Excel. My Question's are
    1. How to get more Knowledge on the Tcodes
    2. How it will Function
    3. In what way we can restrict the Feild values & Activities for the T-codes.
    My functional team Have no Knowledge on this Objects & what activities should be there.
    Now i need to explain them each & every T-Code & what does each feild & Activity Do. If there is any Go-Live document for this it will be really helpful for me.
    For All 30 T-codes I need to create Custom Roles &  Audit need's No Astrick for new custom Roles.
    Vijay

  • Best study-guide for CCNA Security

    Hi..fellows !!
    Wts the Best study-guide for CCNA Security..?? Guys I need it including Authors also...
    Best Regards
    Nuwan

    Hi ,
    I Recently Completed My CCNA-Security Exam & I Followed MW&KW. It is Good. It Covers ALL required for the Exam!!!

  • Any docs or guide for OpenSSO secure Ldap with Opends

    Any docs or guide for OpenSSO secure Ldap with Opends
    Cheers
    Blacknasa

    Hi,
    it seems to be a JRE Problem. When I use the Kerberos implementation from "Vintela Single Sign-On for Java" I can establish a "aes256" secured LDAP connection to the AD Server.
    This LDAP connection allows to change the passwords of the users stored in the AD.
    The problem is that "Vintela Single Sign-On for Java" is not free, so it would be nice to have a solution which works with the Kerberos implementation of the JRE.
    The error is the same for "aes128" and "aes256" encryption.
    And with Wireshark I can not see any differences in the packets send to the AD and received from the AD.

  • Secure Configuration Guide for Lion?

    Is Apple going to release a secure configuration guide for Apple, as it has for its past OS X operating systems?  It doesn't yet exist on the Secure Configuration Guide page on Apple's site.

    i'm also interested in reading this document.
    i posted the same question before reading your post.
    https://discussions.apple.com/message/19256352#19256352

  • Security Hardening guide for ESXi 5

    Hi, I'm looking for a Security Hardening guide for ESXi 5, alternatively, can someone help me in understanding any new security enhancements in v5 over v4or v3 that would help in updating previous hardening guide?
    Many thanks, Jon.

    Hello and Welcome to the Forums!
    The vSphere5 Security Hardening guide is not yet available.  With that said, the vSphere 4.1 Hardening Guide is still very relevant and useful.
    As for what's new, the below document could be useful
    http://www.vmware.com/files/pdf/products/vsphere/vmware-what-is-new-vsphere5.pdf

  • About "kernel.exec-shield" and "because they will bring security issue" for linux ASE

    In " ASE Quick Installation Guide for Linux", "kernel.exec-shield=0" and  “kernel.randomaize-va-space=0” should be set.
    But SuSE engineers say that  “kernel.exec-shield=0”and “kernel.randomaize-va-space=0” will bring the OS security issue.
    Customer want to know why ASE need the above parameters ?
    Has anybody the idea for customer's question?

    If the parameters are not set as documented, attempts to start additional engines beyond the first one will fail, generating stack traces.
    ASE acts in many ways like it's own operating system, scheduling individual user connections (spids) to actively run (note that ASE was developed well before native threading was commonly available).  Each spid has it's own stack information that gets swapped in when it is set to "running" state on the engine and swapped out when it yields the engine.  The mechanics of this is not that different from the buffer overrun exploits described in the Red Hat document linked to by the
    install guide, http://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf
    and the exec-shield mechanics definatately interfere ASE's operations when ASE is using multiple dataserver processes (engines) that swap spids around.
    -bret

  • System exception running Configuration Wizard after installing several security updates for SP

    Greetings,
    Have a 2 server farm, SharePoint 2013 SP1, SQL and SharePoint. Windows Update has 15 updates downloaded and ready to install, 2 Server 2012 updates and 2 SharePoint updates, 11 Security Updates for SharePoint. So, I said yeah, go ahead and install them late
    last night when I figured it wouldn't interrupt folks. (dumb move)
    Windows Update took awhile, but no errors during the install. Rebooted the server as required. Once the server was back, jumped onto the server console and ran the Configuration Wizard to apply the updates to SharePoint. No problem, progressed through the
    screens saying it was going to update, farm and sql information, etc. Config Wizard was going through the steps, then failed with the message: "Failed to register SharePoint services." and here's a link to the configuration log so have a jolly time
    tracking it down, thank you very much.
    I found the error in the log (down about 10,000 lines):
    04/10/2015 03:00:02 12 ERR Task services has failed with an unknown exception
    04/10/2015 03:00:02 12 ERR Exception: Microsoft.SharePoint.SPException ---> System.Runtime.InteropServices.COMException: <nativehr>0x80131904</nativehr><nativestack></nativestack>
    at Microsoft.SharePoint.Library.SPRequestInternalClass.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
    at Microsoft.SharePoint.Library.SPRequest.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
    --- End of inner exception stack trace ---
    at Microsoft.SharePoint.SPGlobal.HandleComException(COMException comEx)
    at Microsoft.SharePoint.Library.SPRequest.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
    at Microsoft.SharePoint.SPListCollection.EnsureListsData(Guid webId, String strListName)
    at Microsoft.SharePoint.SPListCollection.get_Count()
    at Microsoft.SharePoint.Administration.SPAdministrationWebApplication.get_HealthRules()
    at Microsoft.SharePoint.Administration.Health.SPHealthAnalyzer.RegisterRules(Assembly assembly)
    at Microsoft.Office.InfoPath.Server.Util.HealthAnalyzerRegistration.RegisterHealthRules()
    at Microsoft.Office.InfoPath.Server.Administration.FormsService.Update()
    at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.InstallServiceInConfigDB(Boolean provisionTheServiceToo, String serviceRegistryKeyName)
    at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.InstallServices(Boolean provisionTheServicesToo)
    at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.Run()
    at Microsoft.SharePoint.PostSetupConfiguration.TaskThread.ExecuteTask()
    So I've been searching around trying to find a clue about this. I tried using PSConfig as well, no dice. I tried using my admin account, the farm account, and the initial setup account, no dice. So I gave in about 3:00 AM and took a break, rather than have
    my head hit the keyboard. Left IIS down and SP down. Had some help this morning when someone started things back up for me. sigh. So the users have been in on the sites and doing all sorts of important and critical things, so rolling back to the last
    backup is the last, last resort. (Fortunately, I did do a manual backup using a PowerShell script before starting all this.)
    Help. Please.
    The actual sites are up and seem to be working fine. Central Admin is down though, get a 500 Internal Server Error in the browser, so things aren't correct. Duh. The config wizard didn't finish.
    Thanks much,
    Steven

    0x80131904 translates to COR_E_SqlException. Typically this will be an MDF/LDF file out of space, or the volume that those files reside on being out of space. Check that first, then also check the SQLERROR log file for any issues.
    Trevor Seward
    Follow or contact me at...
    &nbsp&nbsp
    This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs.

  • Setting security constraint for web App

    Hai all!
    I am new to bea and i am trying to set up security constraints for my webaplication..
    I want user to be authenticated before he access any of the pages in browser..
    All i did was adding following entries to web.xml
    <security-constraint>
              <web-resource-collection>
                   <web-resource-name>
                        webresources
                   </web-resource-name>
                   <url-pattern>
                   </url-pattern>
              </web-resource-collection>           
              <login-config>          
                   <auth-method>
                   BASIC
                   </auth-method>          
              </login-config>
         </security-constraint>
    But no such thing is happening,,
    I know i am doing wrong but donno where exactly i am wrong..
    Pls guide me in sequnece of steps regarding what to do to accomplish what i want..
    Thanks and Regards
    Manohar

    I guess you need to set the role that is allowed to log into your application.
    try this in web.xml:
         <security-constraint>
              <display-name>Whatever</display-name>
              <web-resource-collection>
                   <web-resource-name>resource</web-resource-name>
                   <description>Desc</description>
                   <url-pattern>/*</url-pattern>
                   <http-method>GET</http-method>
                   <http-method>POST</http-method>
              </web-resource-collection>
              <auth-constraint>
                   <description>desc</description>
                   <role-name>MyRole</role-name>
              </auth-constraint>
                   <user-data-constraint>
                   <transport-guarantee>NONE</transport-guarantee>
              </user-data-constraint>
         </security-constraint>
         <login-config>
              <auth-method>BASIC</auth-method>
         </login-config>
         <security-role>
              <description>desc</description>
              <role-name>MyRole</role-name>
         </security-role>
    and map the role with a group/user in weblogic.xml:
         <security-role-assignment>
              <role-name>MyRole</role-name>
              <principal-name>MyGroupOfUsers</principal-name>
         </security-role-assignment>
    Hope this helps.
    Xavi
    "Manohar" <[email protected]> wrote:
    >
    Hai all!
    I am new to bea and i am trying to set up security constraints for my
    webaplication..
    I want user to be authenticated before he access any of the pages in
    browser..
    All i did was adding following entries to web.xml
    <security-constraint>
              <web-resource-collection>
                   <web-resource-name>
                        webresources
                   </web-resource-name>
                   <url-pattern>
                   </url-pattern>
              </web-resource-collection>           
              <login-config>          
                   <auth-method>
                   BASIC
                   </auth-method>          
              </login-config>
         </security-constraint>
    But no such thing is happening,,
    I know i am doing wrong but donno where exactly i am wrong..
    Pls guide me in sequnece of steps regarding what to do to accomplish
    what i want..
    Thanks and Regards
    Manohar

  • Using OID 9.0.4.x  as security provider  for OC4J 10.1.3

    If you upgrade OC4J to release 10.1.3 (needed for new releases of Jdeveloper)
    and you your Metadata respository is based on 9.0.4.x, you can use Oracle® Containers for J2EE Security Guide 10g Release 3 (10.1.3) B14429-01 Chapter 6 for the steps needed.
    The section Considerations for 9.0.4.x Infrastructure: Access Control List Settings describes that some content in OID needs to be replace to cater for 10.1.3 and ldap ldif file structure is given with instruction on how to run it
    We tried it exactly as instructed (Show below)
    ID management realm (for example, dc=PALCO,dc=com), then execute the steps that follow.
    dn: cn=JAZNContext,cn=Products,cn=OracleContext,%s_MgmtRealmDN%
    changetype: modify
    replace: orclaci
    orclaci: access to entry
    by group= "cn=JAZNAdminGroup,cn=Groups,cn=JAZNContext,cn=Products,cn=OracleContext"
    (browse, add, delete)
    by group= "cn=IASAdmins,cn=Groups,cn=OracleContext,%s_MgmtRealmDN%
    added_object_constraint=(objectclass=orclApplicationEntity) (add, delete, browse)
    by * (none)
    orclaci: access to attr=(*)
    by group= "cn=JAZNAdminGroup,cn=Groups,cn=JAZNContext,cn=Products,cn=OracleContext"
    (search, read, write, compare)
    by group= "cn=IASAdmins,cn=Groups,cn=OracleContext,%s_MgmtRealmDN%"
    (read, search, write, compare)
    by * (none)
    and then running the ldapmodify program
    ldapmodify -c -a -p 389 -h localhost -D cn=orcladmi -w xxxxxx \
    -f int_ammar.ldif
    produces errors
    ldap_modify: additional info: INVALID ACI is access to entry by group
    There has to be something error with the syntax error is providing in the Doc
    Ammar Sajdi, Oracle consultant
    www.e-ammar.com
    oraclejo.blogspot.com
    www.palco-me.com
    Amman

    Finally, i found out what the problem is
    First of all , make sure that no new line exists between LDAP LDIF directives, additionally, make sure that you close the double quotation for CN where even it appears as the script provided does not close all of them when appropriate
    you can fine an already modified file in my website shortly
    http://www.e-ammar.com/Oracle.htm
    This will hopefully save you time
    Regards
    Ammar Sajdi

  • Question about IDS Self Study Guide for IDS

    Hello,
    i'm searching for a self study guide for the ips (ASA-SSM-10/20) where i can see how to configure signatures and deployment.
    Thanks in advance for your help
    regards
    Klaus

    The signature configuration for the SSM module is identical to any of the other IPS sensors. The root of all IPS documentation is here:
    http://cisco.com/en/US/products/hw/vpndevc/ps4077/tsd_products_support_series_home.html
    Here is the ASA 7.1 doc on how to move traffic to the SSM
    http://cisco.com/en/US/docs/security/asa/asa71/configuration/guide/ssm.html

  • System 9 Security guide

    Hi,
    Where do I find the Hyperion System 9 Security Guide refered to in the Planning admin guide?
    Is it a PDF located somewhere.
    Thanks
    CD

    Hi,
    All documents are at :- http://download.oracle.com/docs/cd/E10530_01/welcome.html
    For the Security Guide, click the Installation & Backup tab and it is under common installation.
    Cheers
    John

  • CONFIGURATION GUIDE FOR SNC

    Hi,
    Can anyone send me the config guide for SNC.
    Thanks,
    Manu

    Dear Manu,
    if you are thinking under SNC at Supply Network Collaboration then please read the following link for config: http://help.sap.com/saphelp_scm2007/helpdata/en/0d/3f809d9a58474eb689443d76415d8a/frameset.htm
    if you are thinking under SNC at Secure Network Communications then please read the following link for config:
    http://help.sap.com/saphelp_scm2007/helpdata/en/0d/3f809d9a58474eb689443d76415d8a/frameset.htm
    Hope this helps.
    Regards,
    Tibor

  • Roles / Security guide

    Hello everyone:
    Im administrating a demo SAP Web App Server Java/ABAP and I'd like to know about security but in specific about roles needed for main tasks, for instance, what permissions are needed for an ABAP Developer, XI user, Portal admin, etc, I don't want to give SAP_ALL to everyone.
    Is there any guide / place where I can check this out? not really a guide to Fully Secure SAP Applications, but just about roles needed for each use.
    Thanks!
    Alejandro

    Thanks Sri:
    I actually meant if there's a guide for a WebAs administrator, let's say, besides the predefined roles and their permissions, what happens when I want to create new roles, based on technical/functional decisions, which roles should I pick for them.
    Let's say, I want a developer Java + ABAP user, so he needs permissions / roles A, B and C
    Is there anything like that available?
    Thanks!
    Alejandro

Maybe you are looking for

  • Ipod touch 1st Gen, no volume control after update to 3.1.2

    So i just upgraded my ipod touch to 3.1.2 which cost about $6, and the volume control is missing( even with the headphones plugged in). How can i fix this? i dont want to do a restore and not have the firmware i just paid for.

  • CS4  hang after using Nik Sharpener   - on Snow Leopard

    Hello everyone, coming from Windows to MAC - to avoid trouble - I see it is not trouble free ... ??    While using the Nik Complete collection filters, all filters work fine with CS4 - except Nik Sharpener.  It looks to me that the Filter works OK, o

  • Best way to connect mac clients through Lion Server to AD?

    Ok, so here's what we are trying to set up for our school network. We currently have a 2003 server system hosting our PCs. Authentication - through 2003 server AD When client logs in: Mac Client -------sends info to --------> Lion Server ----passed d

  • Define new MRP Area

    Hi, I  have four plant under one company code. Recently, one more created under the same company code. The Storage loacations are same in SAP across the five plants. While  defining MRP area for the new plant Receiving storage location is used what i

  • MagSafe not connected tightly

    I've been given three "heads" to connect to my MagSafe adapter and one of them doesn't fit tightly with the adapter. However, it still works. Is it okay if I continue to use it? Sorry for my English by the way.