SAP HANA Securities

 

SAP HANA Technology Overview

Introduction to HANA

ERP In-Memory Strategy

In-Memory Computing

Hardware-Innovations

Software-Innovations

HANA Architecture

Suite on HANA

S/4 HANA

HANA Cloud

BI on HANA

Difference between  HANA DB and S/4 HANA

 

SAP HANA Versions

HANA 1.0 SPS03,SPS04….SPS12

HANA DB 2.0—NEW Features

 

SAP HANA Editions

SAP HANA Platform Edition

SAP HANA Enterprise Edition

SAP HANA Enterprise Extended Edition

 

SAP HANA Installation

Installation of SAP HANA DB

Installation of Multi-Tenant DB

Installation of SAP HANA Studio

Configuring SAP HANA DB in HANA Studio

 

 

HANA Tool Overview

HANA Studio

DBA Cockpit

HANA Cockpit & Web IDE

HDBSQL Command Line Tool

SAP HANA Application Lifecycle Management (ALM)

 

HANA User Management

Users and Roles Concept

User and Role Creation

Manage Users and Roles

Grant and Revoke Privileges and Roles

Assign Privileges to User or Role

 

HANA Authentication Methods

Kerberos Authentication Method

SAML – Authentication Method

X509 – Authentication Method

 

HANA Types of Privileges

Authorization Concept

SQL/Object Privileges

SYSTEM Privileges

Package Privileges

Analytic Privileges

Application Privileges

 

Information Views

Attribute View

Analytic View

Calculation View

Procedure

 

Analytic Privileges

Classical/XML based Analytic Privileges

SQL based Analytic Privileges

Dynamic Analytic Privileges

Dynamic Classical Analytic Privilege

Dynamic SQL Analytic Privilege

 

HANA Roles

Create and use Runtime Roles

Grant and revoke Runtime Roles

Difference between Catalog and Repository Roles

Create and use Repository Roles

Pre-delivered roles of  HANA

Transporting HANA Repository Roles and Objects

 

Transportation Methods to transport Repository Roles and its Privileges and Development Objects

Export and Import

Delivery Unit

Application Lifecycle Management (ALM)

Native Transport

CTS (Change and Transport System) Transport

 

HANA Security Administrative Tasks

HANA security perspective in different implementation scenarios

Deactivate / Reactivate User

Reset a locked user

Password policies and parameters

List tables and views that support the user management

Analyze which privileges a user has been granted

Configuring HANA Authorization Trace

Object ownership

HANA Security Views

Audit Policies and approaches to implement audit policies

Transport Mechanism in HANA

HANA Data volume encryption

Reset SYSTEM user Password

 

HANA Multi-Tenant DB Security

Multi-Tenant Database Overview

Multi-Tenant Database Security

Multi-Tenant DB User Management

Multi-Tenant DB Authorizations

Cross-Tenant Database Access

 

SHARE