28.01.2013 Views

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.2 Authentication Overview<br />

Authentication is the process used to validate the identity of the users who connect to <strong>SAP</strong> <strong>HANA</strong>.<br />

Secure authentication mechanisms ensure that the users requesting a connection really are who they claim to be.<br />

Note: For connections to <strong>SAP</strong> <strong>HANA</strong> it is important to distinguish between SQL- and HTTP-based<br />

connections.<br />

For SQL access to <strong>SAP</strong> <strong>HANA</strong> by means of client interfaces, for example, JDBC or ODBC, the following<br />

authentication methods are supported:<br />

● External authentication:<br />

○ Kerberos services<br />

A standardized service for client authentication in networks. The client connects to the Kerberos server to<br />

authenticate the user and to acquire an authentication ticket that proves the user’s identity to the <strong>SAP</strong><br />

<strong>HANA</strong> database. The client uses the ticket to connect to the <strong>SAP</strong> <strong>HANA</strong> database. Kerberos also ensures<br />

the correct identity of the server.<br />

○ SAML (bearer token)<br />

<strong>SAP</strong> <strong>HANA</strong> can authenticate users who provide a valid standard-based SAML assertion issued by a<br />

trusted identity provider.<br />

● Internal authentication<br />

Users are authenticated by the <strong>SAP</strong> <strong>HANA</strong> database using the database user name and password.<br />

<strong>SAP</strong> <strong>HANA</strong> maps the external identity approved by external authentication service to the identity of an internal<br />

database user. This internal database user is then used for authorization checks during the database session.<br />

For HTTP access to <strong>SAP</strong> <strong>HANA</strong> by means of <strong>SAP</strong> <strong>HANA</strong> XS, the following authentication methods are supported:<br />

● User name and password:<br />

○ Using HTTP basic authentication<br />

○ Form-based authentication<br />

● <strong>SAP</strong> logon tickets<br />

12.3 Roles<br />

Roles contain privileges that are used to define which data, application, or function can be accessed and in which<br />

manner consumed. Roles are assigned either to users or to other roles at runtime.<br />

<strong>SAP</strong> delivers some generic roles with <strong>SAP</strong> <strong>HANA</strong> that can be used as they are or as templates (during design time)<br />

for creating roles that meet your company's specific requirements. More information about roles, their use at<br />

runtime and in design time are explained in the subsequent sections.<br />

● Roles<br />

● Roles as Repository Objects<br />

● Creating Roles in the Repository<br />

<strong>SAP</strong> <strong>HANA</strong> <strong>Developer</strong> <strong>Guide</strong><br />

Setting Up Roles and Authorizations<br />

P U B L I C<br />

© 2012 <strong>SAP</strong> AG. All rights reserved. 321

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!