SAP HANA Securities


SAP HANA Technology Overview

Introduction to HANA

ERP In-Memory Strategy

In-Memory Computing



HANA Architecture

Suite on HANA


HANA Cloud


Difference between  HANA DB and S/4 HANA


SAP HANA Versions

HANA 1.0 SPS03,SPS04….SPS12

HANA DB 2.0—NEW Features


SAP HANA Editions

SAP HANA Platform Edition

SAP HANA Enterprise Edition

SAP HANA Enterprise Extended Edition


SAP HANA Installation

Installation of SAP HANA DB

Installation of Multi-Tenant DB

Installation of SAP HANA Studio

Configuring SAP HANA DB in HANA Studio



HANA Tool Overview

HANA Studio

DBA Cockpit

HANA Cockpit & Web IDE

HDBSQL Command Line Tool

SAP HANA Application Lifecycle Management (ALM)


HANA User Management

Users and Roles Concept

User and Role Creation

Manage Users and Roles

Grant and Revoke Privileges and Roles

Assign Privileges to User or Role


HANA Authentication Methods

Kerberos Authentication Method

SAML – Authentication Method

X509 – Authentication Method


HANA Types of Privileges

Authorization Concept

SQL/Object Privileges

SYSTEM Privileges

Package Privileges

Analytic Privileges

Application Privileges


Information Views

Attribute View

Analytic View

Calculation View



Analytic Privileges

Classical/XML based Analytic Privileges

SQL based Analytic Privileges

Dynamic Analytic Privileges

Dynamic Classical Analytic Privilege

Dynamic SQL Analytic Privilege


HANA Roles

Create and use Runtime Roles

Grant and revoke Runtime Roles

Difference between Catalog and Repository Roles

Create and use Repository Roles

Pre-delivered roles of  HANA

Transporting HANA Repository Roles and Objects


Transportation Methods to transport Repository Roles and its Privileges and Development Objects

Export and Import

Delivery Unit

Application Lifecycle Management (ALM)

Native Transport

CTS (Change and Transport System) Transport


HANA Security Administrative Tasks

HANA security perspective in different implementation scenarios

Deactivate / Reactivate User

Reset a locked user

Password policies and parameters

List tables and views that support the user management

Analyze which privileges a user has been granted

Configuring HANA Authorization Trace

Object ownership

HANA Security Views

Audit Policies and approaches to implement audit policies

Transport Mechanism in HANA

HANA Data volume encryption

Reset SYSTEM user Password


HANA Multi-Tenant DB Security

Multi-Tenant Database Overview

Multi-Tenant Database Security

Multi-Tenant DB User Management

Multi-Tenant DB Authorizations

Cross-Tenant Database Access