SAP HANA Securities
SAP HANA Technology Overview
Introduction to HANA
ERP In-Memory Strategy
In-Memory Computing
Hardware-Innovations
Software-Innovations
HANA Architecture
Suite on HANA
S/4 HANA
HANA Cloud
BI on HANA
Difference between HANA DB and S/4 HANA
SAP HANA Versions
HANA 1.0 SPS03,SPS04….SPS12
HANA DB 2.0—NEW Features
SAP HANA Editions
SAP HANA Platform Edition
SAP HANA Enterprise Edition
SAP HANA Enterprise Extended Edition
SAP HANA Installation
Installation of SAP HANA DB
Installation of Multi-Tenant DB
Installation of SAP HANA Studio
Configuring SAP HANA DB in HANA Studio
HANA Tool Overview
HANA Studio
DBA Cockpit
HANA Cockpit & Web IDE
HDBSQL Command Line Tool
SAP HANA Application Lifecycle Management (ALM)
HANA User Management
Users and Roles Concept
User and Role Creation
Manage Users and Roles
Grant and Revoke Privileges and Roles
Assign Privileges to User or Role
HANA Authentication Methods
Kerberos Authentication Method
SAML – Authentication Method
X509 – Authentication Method
HANA Types of Privileges
Authorization Concept
SQL/Object Privileges
SYSTEM Privileges
Package Privileges
Analytic Privileges
Application Privileges
Information Views
Attribute View
Analytic View
Calculation View
Procedure
Analytic Privileges
Classical/XML based Analytic Privileges
SQL based Analytic Privileges
Dynamic Analytic Privileges
Dynamic Classical Analytic Privilege
Dynamic SQL Analytic Privilege
HANA Roles
Create and use Runtime Roles
Grant and revoke Runtime Roles
Difference between Catalog and Repository Roles
Create and use Repository Roles
Pre-delivered roles of HANA
Transporting HANA Repository Roles and Objects
Transportation Methods to transport Repository Roles and its Privileges and Development Objects
Export and Import
Delivery Unit
Application Lifecycle Management (ALM)
Native Transport
CTS (Change and Transport System) Transport
HANA Security Administrative Tasks
HANA security perspective in different implementation scenarios
Deactivate / Reactivate User
Reset a locked user
Password policies and parameters
List tables and views that support the user management
Analyze which privileges a user has been granted
Configuring HANA Authorization Trace
Object ownership
HANA Security Views
Audit Policies and approaches to implement audit policies
Transport Mechanism in HANA
HANA Data volume encryption
Reset SYSTEM user Password
HANA Multi-Tenant DB Security
Multi-Tenant Database Overview
Multi-Tenant Database Security
Multi-Tenant DB User Management
Multi-Tenant DB Authorizations
Cross-Tenant Database Access