28.01.2013 Views

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cross-site request forgery<br />

● Problem<br />

Since there are no clear trust boundaries between different Web sites running in the same Web-browser<br />

session, an attacker can trick users (by sending an e-mail or luring them to a popular Web site that is under<br />

the attacker's control) into clicking a specific hyperlink. The hyperlink displays a Web site that performs<br />

actions on the visitor's behalf, for example, in a hidden iframe.<br />

● Solution<br />

Include a random token in the POST submission which is validated on the server-side. Only if this token is<br />

non-predictable for attackers can one prevent cross-site, request-forgery attacks. The easiest way to prevent<br />

cross-site, request-forgery attacks is by using the standard <strong>SAP</strong> <strong>HANA</strong> XS cookie. This cookie is randomly<br />

and securely generated and provides a good random token which is unpredictable by an attacker<br />

($.session.getSecurityToken()).<br />

Incorrect security configuration<br />

● Problem<br />

No or an inadequate authentication mechanism has been implemented.<br />

● Solution<br />

Applications should have proper authentication in place, for example, by using <strong>SAP</strong> <strong>HANA</strong> built-in<br />

authentication mechanisms and, in addition, the <strong>SAP</strong> <strong>HANA</strong> XS cookie and session handling features.<br />

Application developers must also consider and control which paths are exposed by HTTP to the outside world<br />

and which of these paths require authentication.<br />

Insecure cryptographic storage<br />

● Problem<br />

Sensitive information such as logon credentials is exposed.<br />

● Solution<br />

To prevent unauthorized access, for example, in the event of a system break-in, data such as user logon<br />

credentials must be stored in an encrypted state. Application developers can use the <strong>SAP</strong> <strong>HANA</strong> XS API,<br />

which provides a secured key value store.<br />

Missing restrictions on URL Access<br />

● Problem<br />

Unauthenticated users have access to URLs that expose confidential (unauthorized) data.<br />

● Solution<br />

216<br />

P U B L I C<br />

© 2012 <strong>SAP</strong> AG. All rights reserved.<br />

<strong>SAP</strong> <strong>HANA</strong> <strong>Developer</strong> <strong>Guide</strong><br />

Writing Server-Side JavaScript Applications

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!