安全方面 SAP Integrated Business Planning 2011 股份有限公司或其关联公司版权所有,保留所有权利。

Total Page:16

File Type:pdf, Size:1020Kb

安全方面 SAP Integrated Business Planning 2011 股份有限公司或其关联公司版权所有,保留所有权利。 安全指南 PUBLIC (公共) 文档版本: 1.5 – 202-01-15 安全方面 SAP Integrated Business Planning 2011 股份有限公司或其关联公司版权所有,保留所有权利。 THE BEST RUN 2020 SAP SAP 2020 © 内容 1 安全方面...................................................................4 2 技术系统架构................................................................5 3 用户许可................................................................... 7 3.1 角色和权限..................................................................8 3.2 管理用户许可................................................................8 3.3 我的许可...................................................................10 3.4 数据过滤器.................................................................10 许可过滤器...............................................................11 管理属性许可.............................................................26 4 数据中心和外部审计的安全..................................................... 36 5 数据集成.................................................................. 37 6 安全通信..................................................................39 6.1 内向集成的安全通信.......................................................... 39 6.2 外向集成的安全通信.......................................................... 39 6.3 维护证书信任列表............................................................40 6.4 “维护保护白名单”............................................................40 6.5 管理内容安全策略............................................................41 冻结模式下的内容安全策略 (CSP).............................................. 42 7 数据保护和数据隐私..........................................................44 7.1 词汇表....................................................................45 7.2 主数据记录.................................................................47 7.3 业务用户记录...............................................................48 7.4 相关业务目录...............................................................49 7.5 HTTP 会话期间的数据保护......................................................50 8 使用密钥管理服务切换到自控加密.................................................52 9 显示安全审计日志............................................................55 9.1 如何显示审计分析报告.........................................................55 9.2 如何配置个性化视图.......................................................... 56 9.3 与 NTP 服务保持时间同步.......................................................57 10 病毒扫描..................................................................59 PUBLIC 安全方面 2 公共 内容 11 客户启动的渗透测试..........................................................60 安全方面 PUBLIC 内容 公共 3 1 安全方面 安全始终是包括产品开发、计划和质量保证在内的所有 SAP 产品整个产品生命周期中的重要元素。与其他 SAP 产品类似,SAP Integrated Business Planning (IBP) 旨在在经受来自 Web 的攻击和来自云的攻击的情况下均保护 数据安全。其中最重要的安全重点领域包括: ● 第 5 页上的“技术系统架构” ● 第 36 页上的“数据中心和外部审计的安全” ● 第 37 页上的“数据集成” ● 用户验证(请参阅位于 http://help.sap.com/ibp 的 SAP Help Portal,路径为 “应用程序帮助” “SAP Integrated Business Planning” “管理” “身份和访问管理” “用户验证” ) ● 身份和访问管理(请参阅位于 http://help.sap.com/ibp 的 SAP Help Portal,路径为 “应用程序帮助” “SAP Integrated Business Planning” “管理” “身份和访问管理” ) ● 第 44 页上的“数据保护和数据隐私” ● 网络和通信安全(请参阅位于 http://help.sap.com/ibp 的第 39 页上的“内向集成的安全通信”和 SAP Help Portal,路径为 “应用程序帮助” “SAP Integrated Business Planning” “使用 Microsoft Excel 计划” “业 务用户信息” “自助安装(业务用户)” “设置到 IBP 和计划范围的连接” ) ● 应用程序特定的病毒扫描(请参阅第 59 页上的“病毒扫描”) ● 安全相关日志记录和跟踪(请参阅位于 http://help.sap.com/ibp 的 SAP Help Portal,路径为 “应用程序帮 助” “SAP Integrated Business Planning” “管理” “身份和访问管理” “IAM 信息系统” ) 注意 您可以查找面向数据服务的 SAP HANA Cloud Platform 集成安全指南(网址为 http://help.sap.com/cpi_ds ),路径为 “Security” “Security Guide” 。 SAP 关注 IBP 系统架构内的安全问题和数据保护。作为用户,需要确保: ● 创建相应业务角色并将其分配至业务用户 ● 保护正在运行 Microsoft Excel 的 IBP 加载项的客户端 ● 针对从中导入数据的系统(面向数据服务的 SAP Cloud Platform Integration)设置安全数据集成 PUBLIC 安全方面 4 公共 安全方面 2 技术系统架构 SAP Integrated Business Planning 是在 SAP 公有云中运行的云产品。 由于来自 SAP 的云解决方案处理来自核心业务流程的业务数据,因此 SAP 恪守以下安全和质量需求: ● 业务数据安全地存储在 SAP 数据中心中。 ● 需要访问业务数据的用户必须对自己进行身份验证,并且其身份必须由 SAP Cloud Platform Identity Authentication 服务或企业预置身份提供者验证,具体视实际系统架构而定。用户只能在所分配业务角色权限 范围内执行操作和查看或编辑数据。 有关详细信息,请参阅 SAP Help Portal 上的 SAP Library,网址为 http://help.sap.com/ibp,路径为 “应用 程序帮助” “身份和访问管理” “用户权限” 。 ● 客户数据始终属于客户。 使用唯一且客户特定的 URL 可以访问来自 SAP 的云解决方案。通信通过 SAP 数据中心中的反向代理组件来实 现。反向代理是 SAP Web 请求分配器,由 SAP Cloud 支持开发和维护。设备和 SAP Cloud 之间的通信由顶尖开放 加密标准和协议(如安全套接层 (SSL) 和传输层安全 (TLS))担保和保护。客户端和 SAP Integrated Business Planning 系统通过 Microsoft Excel 和 Web 浏览器的加载项进行通信。 SAP Integrated Business Planning 还与面向数据服务的 SAP Cloud Platform Integration 进行集成。集成服务 直接连接到企业预置系统以提取并通过 HTTPS 将数据从源系统安全移动至 SAP Integrated Business Planning 目 标表。面向数据服务的 SAP Cloud Platform 集成也可用于导出 SAP Integrated Business Planning 计算场景。 此外,SAP Integrated Business Planning 与 SAP Jam 集成,提供了协作式决策制定解决方案,即汇聚人员、 信息和成熟业务方法以推动产生快速而有意义的结果。SAP Jam 允许您与团队的其他成员协作以及跟踪您的流程和 流程相关任务。SAP Integrated Business Planning 和 SAP Jam 之间的通信由 HTTPS 担保。 ETL 工具通过 HTTPS 可收到通过 RESTful Web 服务消耗的 SAP Integrated Business Planning 关键指标。 SAP Integrated Business Planning 由 SAP HANA 支持。所有客户数据存储在 HANA 数据库中,且数据受 SAP Cloud powered by SAP HANA 的安全基础架构和操作过程保护。 安全方面 PUBLIC 技术系统架构 公共 5 系统架构 PUBLIC 安全方面 6 公共 技术系统架构 3 用户许可 用户许可形成安全访问 SAP Integrated Business Planning 的主干。 对业务应用的访问由身份和访问管理提供的基于角色的权限概念控制。该权限概念基于向业务角色分配业务目 录和业务用户,并为角色指定限制。 计划数据内容的访问也由 IBP 特定数据过滤器控制: ● 许可过滤器 ● 属性许可 管理员通过以下方式确保业务和用户数据的安全性和完整性: ● 通过将业务目录分配至角色 ● 通过定义属性许可 ● 通过按角色授权对关键指标的访问 ● 通过创建许可过滤器 业务角色 使用身份和访问管理应用创建角色和权限,并向用户授予 SAP Fiori 应用的访问权限。创建角色后,将为其分配 业务目录和业务用户。业务目录包含特定的限制和权限,可授予用户仅访问与其相关的类型信息的许可。这样可以 防止访问特定用户没有许可查看的信息。例如,“关键指标”限制类型控制所选计划范围中关键指标的读/写访问权 限。 属性许可 属性许可使用定义属性白名单的规则来限制对主数据属性的读写访问权限。属性许可使用“管理属性许可”应用维 护,并可以直接或通过用户组分配给用户。 许可过滤器 许可过滤器通过过滤属性值组合来限制对关键指标值的读写访问权限。许可过滤器同样通过过滤属性值来限制 对主数据类型中主数据记录的读取访问权限。 例如,允许对包含产品标识 XYZ 的组合进行读取访问,但可以拒绝对相同组合的写入访问。 对于用户,许可过滤器将应用于已通过业务角色授予用户访问权限的关键指标。 您可以使用“管理许可过滤器”应用维护许可过滤器。 安全方面 PUBLIC 用户许可 公共 7 可通过以下方法将许可过滤器分配给用户: ● 直接 ● 通过用户组 ● 通过业务角色 3.1 角色和权限 SAP Integrated Business Planning 使用“身份和访问管理”提供的权限概念。该权限概念基于向业务角色分配业 务目录和业务用户,并为角色指定限制。 有关详细信息,请参阅 http://help.sap.com/ibp 上的 SAP Help Portal,路径为 “应用程序帮助” “SAP Integrated Business Planning” “管理” “身份和访问管理” “基本概念” “业务角色” 。 初始用户提供 将为您提供 SAP Integrated Business Planning 的超级用户,该用户具有设置系统的所有必需权限。通过此用 户,可以创建员工记录和业务用户,并为用户分配所需业务角色。 请注意,在生产环境中不应使用此超级用户。完成用户和角色设置后,应取消激活超级用户。 3.2 管理用户许可 您使用此应用检查业务用户的访问权限和其他许可相关信息。 目的 作为管理员,您可以使用“管理用户许可”应用根据已分配给用户的业务角色、许可过滤器和属性许可查看和编辑 用户的访问权限。 关键功能 作为管理员,您可以使用此应用显示任何业务用户的以下许可列表: ● 用户数据 ● 分配给用户的业务角色 PUBLIC 安全方面 8 公共 用户许可 ● 用户所属的用户组 ● 分配给用户的许可过滤器(通过直接分配、用户组分配或业务角色) ● 分配给用户的属性许可(通过直接或用户组分配) ● 用户具有读/写访问权限的每个计划范围的关键指标列表。这是用户业务角色中定义的关键指标限制与用户的 许可过滤器报表中的可访问关键指标相结合的结果。 除上述内容外,您还可以执行以下操作: ● 显示用户具有读/写访问权限的主数据属性列表。这是用户属性许可的结果。 ● 在详细信息页面的相应部分编辑每种许可类型。 ● 复制现有用户许可并选择将目标用户与源用户的所有许可合并,或仅复制特定对象的许可。 ● (使用令牌)搜索多个用户。 注意 上述功能仅供管理员使用。 活动 可以执行以下操作: ● 导航到用户的详细视图 ● 以 CSV 文件格式下载业务用户的许可详细信息 注意 若选择图标,您只能下载带有所有用户许可列表的概览表;若在下拉菜单中选择第一个选项,您可以下载 带有所有用户许可列表的概览表;若选择第二个选项,则可以下载所选单个或多个用户的许可详细信息。 ● 复制现有用户许可 复制用户许可 可以通过以下方式将许可对象从一个用户复制到另一个用户: ● 从概览表中选择用户,然后选择概览表正上方提供的“复制用户许可”按钮。 ● 导航到用户的详细信息页面,然后选择“复制用户许可”按钮。 使用任一方法选择源用户后,系统将提示您选择目标用户,然后在“选择许可”对话框中,您可以选择以下复制选 项之一: ● 复制目标用户的所有可用许可(缺省行为) ● 将源用户的所选许可复制到目标用户 ● 合并所有许可(缺省行为),或仅合并源用户与目标用户的所选现有许可 注意 如果不选择“合并”选项,系统将删除目标用户的现有许可。 安全方面 PUBLIC 用户许可 公共 9 相关信息 第 10 页上的“我的许可” 3.3 我的许可 使用此应用查看自己的访问权限和其他许可相关的信息。 目的 作为业务用户,您可以使用“我的许可”应用根据已分配的业务角色、许可过滤器和属性许可查看您的访问权限。 关键功能 您可使用此应用显示以下信息: ● 您的用户数据 ● 分配给您的业务角色 ● 分配给您的用户组 ● 分配给您的许可过滤器(通过直接分配、用户组分配或业务角色) ● 分配给您的属性许可(通过直接分配或用户组分配) ● 针对您具有读/写访问权限的每个计划范围分配给您的关键指标是业务角色中定义的关键指标限制与您的许可 过滤器报表中的可访问关键指标相结合的结果 ● 您具有读/写访问权限的主数据属性是属性许可的结果 3.4 数据过滤器 要限制对用户可以在 IBP 中读取或写入的数据的访问,请使用许可过滤器和属性许可。 PUBLIC 安全方面 10 公共 用户许可 3.4.1 许可过滤器 许可过滤器可用于定义对 IBP 中的数据进行读取和写入访问的访问控制规则。 主数据类型 读取访问的过滤条件适用于主数据记录,其中主数据类型中至少存在一个条件中的相应属性。因此,对用户可 见的主数据条目有限。 有必要了解读取访问的过滤条件不适用于主数据类型,除非它们至少有一个条件属性。复合主数据类型也是如 此。 如果有主数据类型属性没有应用读取访问的过滤条件,则用户可以访问任何相关数据。 注意 写入访问的过滤条件不适用于主数据类型。 关键指标值 读取和写入访问的过滤条件适用于存储的关键指标值。该条件适用于与关键指标相关的属性的存储输入值。换 句话说,当基础输入关键指标不可见或不可写入时,则顶级关键指标既不可见也不可写入。这确保了当用户无法访 问组成关键指标值的基础信息部分时,不能从生成的关键指标值中提取信息。因此,必须仔细设计许可过滤器,以 考虑所有存储的输入关键指标。 注意 写入访问的过滤条件适用于在同一许可过滤器中定义的读取访问的过滤条件可见的一组数据。此外,写入访 问的过滤条件适用于在“关键指标的写访问”下定义的一组关键指标。如果将这些关键指标设置为“非限制”,则 写入访问的过滤条件适用于所有同一许可过滤器的读取访问的过滤条件可见的关键指标数据。 相关信息 第 12 页上的“管理许可过滤器” 第 13 页上的“使用许可过滤器” 第 14 页上的“使用运算符来定义过滤器条件” 第 15 页上的“许可过滤器的示例” 第 16 页上的“在许可过滤器中使用自动完成” 安全方面 PUBLIC 用户许可 公共 11 3.4.1.1 管理许可过滤器 许可过滤器允许身为管理员的用户限制对特定主数据类型和关键指标值的用户访问。通过指定属性值的条件, 可针对用户可用的特定计划范围(以及关联的计划视图)定义这些许可过滤器。 可通过直接或间接的形式,将许可过滤器分配给用户: ● 针对单个用户的直接用户分配(在“已分配用户”标签中) ● 间接用户分配 ○ 分配到“已分配用户组”标签上的用户组 ○ 分配到业务角色(在“维护业务角色”应用中) 一次可以为同一用户分配多个许可过滤器。 注意 通过向同一用户分配多个许可过滤器,可扩大访问权限。作用效果可累计,并非相互制约。 组合分配至用户的所有许可过滤器,使用户有权访问所有允许的属性组合集联合定义的数据。 可在“变更历史记录”标签上审核对许可过滤器进行的所有变更。变更历史记录显示了更改的内容以及更改者和更 改位置。 您可以检查“许可过滤器报表”,以便对某个许可过滤器的管理数据和可访问关键指标以及系统生成的 where 子 句有一个大致了解。 观看视频 支持的设备类型 ● 台式机 ● 平板电脑 ● 智能手机 相关信息 第 13 页上的“使用许可过滤器” PUBLIC 安全方面 12 公共 用户许可 3.4.1.1.1 使用许可过滤器 了解如何定义和更改许可过滤器。 可以按照以下步骤在“管理许可过滤器”应用中创建许可过滤器: 1. 单击“新建”,输入名称和描述(可选),然后选择计划范围。 2. 如果需要,在“读访问的过滤条件”、“关键指标的写访问”或“写访问的过滤条件”下指定过滤器属性。 读访问的过滤条件 选择您的过滤标准,或选择“无限制”。如果选择“无限制”,所有值可用于读取访问。 关键指标的写访问 选择一个或多个存储的关键指标或选择“无限制”。 所选写入关键指标定义在写访问的过滤条件所定义的数据集上可编辑的关键指标。如果选择“无限制”,所有关 键指标均可编辑。 写访问的过滤条件 指定您的过滤条件,或选择“无限制”或“禁止访问”。如果选择“无限制”,则允许进行读取访问的所有过滤器条 件上的关键指标都可进行编辑。如果选择“禁止访问”,则不可编辑任何关键指标。 请注意下列事项: ○ 如果您定义的过滤器多次使用相同属性,则这些条件由 OR 连接,如下列示例所示: 示例一 属性 运算符 值 客户标识 等于 公司 ABC 客户标识 等于 公司 XYZ 结果:可以查看客户标识为公司 ABC 或公司 XYZ 的所有数据。 ○ 如果用“不等于”运算符多次使用相同的属性,则这些条件由 AND 连接。 ○ 如果您定义的过滤器使用两个或两个以上不同属性,则这些条件由 AND 连接,如以下示例所示。 示例二 属性 运算符 值 客户标识 等于 公司 ABC 客户标识 等于 公司 XYZ 位置地区 等于 美国 结果:可以查看同时满足以下条件的计划数据: ○ 属于位置地区美国 ○ 属于公司 ABC 或公司 XYZ 3. 选择运算符并输入值。 有关运算符的详细信息,请参见第 14 页上的“使用运算符来定义过滤器条件”。 4. 定义所需的附加过滤条件。 安全方面 PUBLIC 用户许可 公共 13 5. 如果想要为给定关键指标的相关属性触发自动生成值,打开“自动完成过滤器条件值”功能。有关详细信息,请 参阅第 16 页上的“在许可过滤器中使用自动完成”。 注意 如果在过滤器中未定义计量单位或货币换算,则应用会将其视为可见。在所选的过滤器属性的顶部,基础 计划级别可能会包含其他需要无效的属性。当开关处于活动状态时,该应用会通过包含在过滤器条件中的 成员属性分析所有关键指标的数据模型,并为相关属性生成值。如果未在过滤器中定义任何计量单位或货
Recommended publications
  • Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE College India
    Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE college India. India. Abstract: In this paper we reviewed the technical and service aspects of different Cloud providers and presents the comparisons of these selected service offerings in cloud computing. By this User can have good understanding regarding services provided to avoid bottlenecks are also obstacles that could limit the growth. This comparison of cloud service providers, to serve as a starting point for user looking to take throw service and for Selecting the better one for there need into cloud environment . Keywords: Cloud Computing, Service Vendors, Cloud Services. I. Introduction As the use of computers in our day-to-day life has increased, the computing resources that we need also grown up. It was costly to buy a mainframe and computer‘s, it became important to find the alternative ways to get the greatest return on the investment, allowing multiple users to share among both the physical access to the computer from multiple terminals and to share the CPU time, eliminating periods of inactivity, which became known in the industry as time- sharing[1]. The origin of the term cloud computing is vague, but it appears to derive from the way of drawings of stylized clouds to denote networks in diagrams of computing and communications systems.Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application‘s to a ‗cloud‘ of computers.
    [Show full text]
  • Magic Quadrant for Enterprise High-Productivity Application Platform As a Service
    This research note is restricted to the personal use of [email protected]. Magic Quadrant for Enterprise High- Productivity Application Platform as a Service Published: 26 April 2018 ID: G00331975 Analyst(s): Paul Vincent, Van Baker, Yefim Natis, Kimihiko Iijima, Mark Driver, Rob Dunie, Jason Wong, Aashish Gupta High-productivity application platform as a service continues to increase its footprint across enterprise IT as businesses juggle the demand for applications, digital business requirements and skill set challenges. We examine these market forces and the leading enterprise vendors for such platforms. Market Definition/Description Platform as a service (PaaS) is application infrastructure functionality enriched with cloud characteristics and offered as a service. Application platform as a service (aPaaS) is a PaaS offering that supports application development, deployment and execution in the cloud. It encapsulates resources such as infrastructure. High- productivity aPaaS (hpaPaaS) provides rapid application development (RAD) features for development, deployment and execution — in the cloud. High-productivity application platform as a service (hpaPaaS) solutions provide services for declarative, model-driven application design and development, and simplified one-button deployments. They typically create metadata and interpret that metadata at runtime; many allow optional procedural programming extensions. The underlying infrastructure of these solutions is opaque to the user as they do not deal with servers or containers directly. The rapid application development (RAD) features are often referred to as "low-code" and "no-code" support. These hpaPaaS solutions contrast with those for "high-control" aPaaS, which need professional programming — "pro-code" support, through third-generation languages (3GLs) — and provide transparent access to the underlying infrastructure.
    [Show full text]
  • Microsoft License Mobility Through Software Assurance
    Microsoft License Mobility through SoftwareLicense Assurance Mobility through Software Assurance LICENSE MOBILITY THR OUGH SOFTWARE ASSURANCE Authorized Mobility Partners Customers can choose either Microsoft Azure or an Authorized Mobility Partner to utilize the benefits of License Mobility through Software Assurance. On the following pages is a current list of partners who are authorized to assist Microsoft Volume Licensing customers to deploy their dedicated application server workloads using License Mobility through Software Assurance. Please check with Microsoft Azure or these partners to confirm which services they offer and if they serve your region. If your partner is not currently listed, refer them to the License Mobility through Software Assurance website to complete the Microsoft License Mobility Partner Authorization process. For more information, contact your Microsoft account manager or preferred reseller. Note to Partners: If your information below needs to be updated, please contact your Services Provider License Agreement (SPLA) reseller. July 2017 Microsoft Volume Licensing License Mobility through Software Assurance Authorized Mobility Partner Partner home page Microsoft Azure azure.microsoft.com/en-us/pricing/license-mobility/ @XYZ Pty Ltd www.xyznetworks.net.au «@ scriptum» Ltd www.claster.tel «Data center - AVIS» Limited Liabilty Company www.avis-dc.ru 1ST DNS Ltd www.1stdomains.co.uk 2000 Computers & Networks Pty Ltd www.2000cn.com.au 24 Solutions AB www.24solutions.se 24/7 Business Support Ltd www.247businesssupport.co.uk 2AT B.V. www.2at.nl 2CIT IT-specialist AB www.2cit.se 2E2 (IOM) LIMITED www.2e2.co.im 3 PRO d.o.o. www.3pro.hr 3 Step IT Oy www.nevtor.com 321 Internet Pty Ltd www.321.com.au 3-IT bvba www.3-it.be 3M Cogent, Inc www.cogentsystems.com 3NT Solution LLP www.3nt.com 3rdmill Pty Ltd www.3rdmill.com.au 4 Dimensions A/S www.4dim.it 4d Innovations Group (Pty) Ltd www.eset.co.za 4D TECH (PTY)LTD www.4dtech.co.za 4net AG www.4net.ch 5NINES DATA LLC www.5nines.com 7digital Limited www.7digital.com 7Technology Sp.
    [Show full text]
  • Bernd Himmelsbach VP Cloud Architecture & Engineering, SAP
    OpenStack in Production Bernd Himmelsbach VP Cloud Architecture & Engineering, SAP October, 2016 © 2016 SAP SE or an SAP affiliate company. All rights reserved. 1 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 2 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 3 Some High Level Figures of SAP 80k+ employees 70+ data centers 7+ PB RAM capacity 100+ PB Storage capacity 90+ PB backup capacity Multiple multi billion USD acquisitions during the last years (successfactors, Ariba, Concur…) © 2016 SAP SE or an SAP affiliate company. All rights reserved. 4 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 5 2014: SAP’s Cloud Infrastructure Challenge 23 Clouds Cloud A Cloud B Cloud C One Cloud Application Lifecycle Management Manual Semi-automated Automated E2E LifeCycle installation/upgrades installation/upgrades installation/upgrades Automation Hybrid Multi- OpenSource + VMware IaaS Management VMware vSphere Home-Grown + XEN Hypervisor, vSphere Public/Private IaaS Infrastructure Harmonized Cloud Architecture DC1 DC2 … DC … DC DC1 DCn Architecture Building Block Server & Storage Farm (HANA) Cell Capacity / Utilization Data Center Locations WDF/ROT, Dublin, NSQ WDF/ROT, Ashburn, WDF/ROT, NSQ, Tokyo, All SAP Data Centers Culpepper Sydney © 2016 SAP SE or an SAP affiliate company.
    [Show full text]
  • Red Hat Certified Cloud & Service Provider Program:: Technical and Operations Guide
    Red Hat Certified Cloud & Service Provider Program Technical and Operations Guide October 2020 Version 1.32 Table of Contents DISCLAIMER . 1 1. INTRODUCTION . 2 2. RELEASE NOTES . 3 2.1. NEW OFFERINGS . 3 2.2. CHANGES & UPDATES . 3 3. CCSP PROGRAM OVERVIEW . 4 4. CCSP PRODUCT OFFERINGS . 5 4.1. CCSP PRODUCT OFFERINGS OVERVIEW . 5 4.1.1. CCSP PRODUCT CATALOG 5 4.1.2. CCSP OFFERING RULES 6 5. CCSP PRODUCT DETAILS AND REQUIREMENTS. 8 5.1. INFRASTRUCTURE PRODUCTS . 8 5.1.1. RED HAT ENTERPRISE LINUX 8 5.1.2. RED HAT ENTERPRISE LINUX ADD-ONS 10 5.1.3. RED HAT ENTERPRISE LINUX FOR POWER 12 5.1.4. RED HAT ENTERPRISE LINUX FOR Z SYSTEMS 13 5.1.5. RED HAT ENTERPRISE LINUX FOR Z SYSTEMS EXTENDED LIFE CYCLE SUPPORT ADD-ON 14 5.1.6. RED HAT ENTERPRISE LINUX FOR IBM SYSTEM Z AND LINUXONE WITH COMPREHENSIVE ADD-ONS 15 5.1.7. RED HAT OPENSTACK PLATFORM 16 5.1.8. RED HAT OPENSTACK PLATFORM EXTENDED LIFE CYCLE SUPPORT ADD-ON 17 5.1.9. RED HAT VIRTUALIZATION 18 5.1.10. RED HAT VIRTUALIZATION FOR IBM POWER 19 5.2. CLOUD-NATIVE APPLICATION PLATFORMS, APPLICATION DEVELOPMENT, AND MIDDLEWARE . 20 5.2.1. RED HAT OPENSHIFT CONTAINER PLATFORM 20 5.2.2. RED HAT OPENSHIFT CONTAINER PLATFORM FOR POWER 21 5.2.3. RED HAT OPENSHIFT CONTAINER PLATFORM BUNDLES 22 5.2.4. RED HAT MIDDLEWARE 23 5.2.5. RED HAT MIDDLEWARE EXTENDED LIFE CYCLE SUPPORT ADD-ONS 25 5.2.6. RED HAT MIDDLEWARE BUNDLES 26 5.2.7.
    [Show full text]
  • Cloud Computing Bible
    Barrie Sosinsky Cloud Computing Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-90356-8 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
    [Show full text]
  • Deploying SAP HANA on Red Hat Virtualization a Guide to Deploying SAP HANA on Red Hat Virtualization 4.2 and 4.3
    Deploying SAP HANA on Red Hat Virtualization A guide to deploying SAP HANA on Red Hat Virtualization 4.2 and 4.3 Abstract: This guide contains information about SAP HANA hardware requirements and best practices. It includes examples of SAP HANA and RHV-specific configuration settings and deployment options to consider when using the two products together. Date: August, 2020 Version: 2.1.3 Copyright © 2020 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Red Hat logo, and JBoss are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries. Linux​® ​ is the registered trademark of Linus Torvalds in the U.S. and other countries. Contents Introduction 4 Hardware requirements 4 Configuring the BIOS settings of the RHV hosts 4 Installing and configuring RHV hosts 7 Verifying system requirements for the RHV host 7 Installing the RHV host 7 Updating the kernel 7 Setting the kernel boot options 8 Deploying a new RHV host 9 Changing an existing RHV host 9 Setting the tuned profile for RHV host 11 Information on C-States 11 Configuring Skylake-specific settings 13 Configuring an RHV cluster running SAP HANA 13 Disabling KSM on the host manually 14 Installing required hooks for the virtual guests 15 Sizing Guidelines for VMs 19 Influence of Hyperthreading 19 Reviewing the performance degradation between virtual and bare metal systems 19 Observations with SAP’s BWH performance test 20 Storage Setup 21 Storage variant A: Controller passthrough 21 Setting up Fibre Channel HBA passthrough for
    [Show full text]
  • Oracle Linux Virtualization Manager
    Oracle Linux Virtualization Manager Oracle Linux Virtualization Manager is a server virtualization management platform that can be easily deployed to configure, monitor, and manage an Oracle Linux Kernel-based Virtual Machine (KVM) environment. Oracle Linux Key Features KVM and Oracle Linux Virtualization Manager provide a modern, open source, Leading high performance alternative to proprietary server virtualization solutions price/performance with zero licensing costs. using a modern, low overhead An Oracle Linux Premier Support subscription provides customers access to architecture based award-winning Oracle support resources for Oracle Linux Virtualization on the KVM hypervisor Manager, KVM, Oracle Linux, zero-downtime patching with Ksplice, cloud Self-Hosted native tools such as Kubernetes and Kata Containers, clustering tools, Oracle Engine offers a Linux Manager, and Oracle Enterprise Manager. All this and lifetime software hyper-converged management support is included in a single cost-effective support offering. For customers solution with high with an Oracle Cloud Infrastructure subscription, Oracle Linux Premier availability for the support is included at no additional cost. Unlike many other commercial Linux Manager distributions, Oracle Linux is easy to download and completely free to use, Full REST API allows greater distribute, and update. automation and interoperability Oracle Linux KVM Support for secure live migration and Starting with Oracle Linux Release 7 with the Unbreakable Enterprise Kernel (UEK) Release storage live 5, Oracle Linux KVM has been enhanced to deliver leading performance and security for migration hybrid and multi-cloud deployments. Users can take a previously deployed Oracle Linux VM high system and turn the operating environment into a KVM host, or a KVM configuration can availability be set up from a base Oracle Linux installation.
    [Show full text]
  • Chapter 1 Cloud Computing
    Contents 1 Cloud computing 1 1.1 Overview ............................................... 1 1.2 History of cloud computing ...................................... 1 1.2.1 Origin of the term ....................................... 2 1.2.2 The 1950s ........................................... 2 1.2.3 The 1990s ........................................... 2 1.3 Similar concepts ............................................ 3 1.4 Characteristics ............................................. 3 1.5 Service models ............................................ 4 1.5.1 Infrastructure as a service (IaaS) ............................... 5 1.5.2 Platform as a service (PaaS) ................................. 5 1.5.3 Software as a service (SaaS) ................................. 5 1.6 Cloud clients .............................................. 5 1.7 Deployment models .......................................... 6 1.7.1 Private cloud ......................................... 6 1.7.2 Public cloud .......................................... 6 1.7.3 Hybrid cloud ......................................... 6 1.7.4 Others ............................................. 7 1.8 Architecture .............................................. 7 1.8.1 Cloud engineering ....................................... 7 1.9 Security and privacy .......................................... 7 1.10 The future ............................................... 8 1.11 The cloud revolution is underway ................................... 8 1.12 See also ...............................................
    [Show full text]
  • Media and Communications Supply Chain Analysis
    Media and Communications Supply Chain Analysis Ovum Report to DBCDE 24 June 2013 – Final report Project Number CYTE0678 Table of contents 1 Key Findings 4 2 Project Background 5 2.1 Scope of the project 5 2.2 Structure of the report 5 2.1 Why the supply chain matters 5 3 Supply chain trends: top-level assessment 7 3.1 Key findings 7 3.2 The traditional supply chain 9 3.3 The emerging supply chain 11 3.4 Competition and innovation 15 3.4.1. Competition 15 3.4.2. Innovation 17 3.5 Consumer implications: top level assessment 18 3.5.1. Revenue models 18 3.5.2. Privacy, security and consumer protection 19 3.5.3. Universal service, local content and community standards 20 4 Supply chain trends: the role of infrastructure and devices 22 4.1 Key findings 22 4.2 The traditional infrastructure supply chain 22 4.3 The emerging infrastructure supply chain 24 4.3.1. Cloud IT infrastructure and platforms 25 4.3.2. IP connectivity and the software defined network 29 4.3.3. Devices and the managed device platform 33 4.3.4. The vendor landscape 35 4.4 Competition and innovation 36 4.4.1. Competition 36 4.4.2. Innovation 38 4.5 Consumer implications 38 4.5.1. Consumer revenue models 38 4.5.3. Service availability and consumer recourse 39 5 Supply chain trends: an industry-level assessment 41 2 5.1 Voice and Messaging Services 41 5.1.1. The traditional supply chain 41 5.1.2.
    [Show full text]
  • IBM Storage: Product Guide
    IBM Storage Product guide Contents 3 Introduction 5 Portfolio 7 Storage for data and AI 11 Storage for hybrid cloud 18 Data Resilience 22 Storage for IBM Z 26 Storage for SAP HANA 30 Storage for containers 35 Storage networking 39 Converged infrastructure 42 IBM Services for storage 43 Conclusion IBM Storage is the Storage right foundation for your data-driven made hybrid cloud. simple Introduction Every day you face a complex mix of events that IBM® Storage simplifies your data infrastructure What’s possible Storage for hybrid cloud can affect business outcomes, like managing using an underlying software foundation to Reduce complexity with container-enabled growing data and LOB applications, maintaining strengthen and streamline the storage in your with IBM Storage enterprise storage, deployed seamlessly core IT applications and uncovering competitive hybrid cloud environment, using a simplified across on-premises and hybrid cloud advantage. All of these demands put pressure on approach to containerization, management storage environments. your storage infrastructure’s performance, and data protection. capacity and security. AI and data Simplify your infrastructure with optimized efficiency to drive faster results that are massively scalable and globally available from edge to inference. Data resilience Maximize backup storage efficiency, data security and performance with maximum uptime and resilience while lowering costs. Storage for containers Surpass your business goals with speed, productivity and agility, all enabled by a security-rich,
    [Show full text]
  • Implementing and Developing Cloud Computing Applications [2011]
    Implementing and Developing Cloud Computing Applications K11513_C000.indd 1 10/18/10 2:47 PM Implementing and Developing Cloud Computing Applications DAVID E.Y. SARNA K11513_C000.indd 3 10/18/10 2:47 PM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-3082-6 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
    [Show full text]