SAP IQ Administration: User Management and Security Company
Total Page:16
File Type:pdf, Size:1020Kb
ADMINISTRATION GUIDE | PUBLIC SAP IQ 16.1 SP 04 Document Version: 1.0.0 – 2019-04-05 SAP IQ Administration: User Management and Security company. All rights reserved. All rights company. affiliate THE BEST RUN 2019 SAP SE or an SAP SE or an SAP SAP 2019 © Content 1 Security Management........................................................ 5 1.1 Plan and Implement Role-Based Security............................................6 1.2 Roles......................................................................7 User-Defined Roles.........................................................8 System Roles............................................................ 30 Compatibility Roles........................................................38 Views, Procedures, and Tables That Are Owned by Roles..............................38 Display Roles Granted......................................................39 Determining the Roles and Privileges Granted to a User...............................40 1.3 Privileges..................................................................40 Privileges Versus Permissions.................................................41 System Privileges......................................................... 42 Object-Level Privileges......................................................64 System Procedure Privileges..................................................81 1.4 Passwords.................................................................85 Password and user ID Restrictions and Considerations...............................86 Granting the CHANGE PASSWORD System Privilege to a User..........................86 Revoking the CHANGE PASSWORD System Privilege from a User........................88 Changing a Password – Single Control...........................................90 Dual Control Password Management Option.......................................91 Changing a Password – Dual Control............................................93 1.5 Impersonation..............................................................94 Requirements for Impersonation...............................................95 Granting the SET USER System Privilege to a User..................................98 Starting to Impersonate Another User..........................................100 Verifying the Current Impersonation Status of a User................................101 Stopping Impersonation of Another User........................................102 Revoking the SET USER System Privilege from a User...............................103 1.6 Users....................................................................104 Default (DBA) User........................................................105 Superuser.............................................................. 111 Increase Password Security..................................................111 Password and user ID Restrictions and Considerations...............................112 Case-Sensitivity of User IDs and Passwords.......................................112 Creating a New User.......................................................113 Deleting a User...........................................................113 SAP IQ Administration: User Management and Security 2 PUBLIC Content Changing a User's Password................................................. 114 Converting a User-Extended Role Back to a User...................................115 Permanently Locking a User Account...........................................116 Unlocking User Accounts....................................................117 Automatic Unlocking of User Accounts..........................................118 1.7 Login Policies.............................................................. 119 Login Policy Options.......................................................120 LDAP Login Policy Options.................................................. 122 Modifying the Root Login Policy...............................................123 Creating a New Login Policy..................................................124 Modifying an Existing Login Policy.............................................125 Deleting a Login Policy..................................................... 126 Assigning a Login Policy When Creating a New User.................................126 Assigning a Login Policy to an Existing User.......................................127 1.8 User Connections...........................................................127 Preventing Connection After Failed Login Attempts.................................128 Creating a DBA Recovery Account.............................................130 Logging In with a DBA Recovery Account........................................130 Manage Connections Using Stored Procedures....................................130 Manage Resources Used by Connections........................................ 131 1.9 Security with Views and Procedures..............................................132 Views Provide Tailored Security...............................................133 Use Procedures to Provide Tailored Security......................................136 1.10 Data Confidentiality..........................................................139 Database encryption and decryption...........................................139 IPv6 Support............................................................144 How to Set Up Transport Layer Security.........................................145 Digital certificates........................................................ 146 1.11 Utility Database Server Security.................................................152 Defining the Utility Database Name When Connecting...............................152 Defining the Utility Database Password..........................................153 Permission to Execute File Administration Statements...............................154 1.12 Data Security..............................................................155 System Secure Features....................................................155 1.13 Data Protection and Privacy in SAP IQ.............................................158 Deletion of Personal Data....................................................161 2 External Authentication..................................................... 163 2.1 LDAP User Authentication with SAP IQ............................................163 License Requirements for LDAP User Authentication................................164 About the LDAP Server Configuration Object..................................... 164 Failover Capabilities When Using LDAP User Authentication...........................165 SAP IQ Administration: User Management and Security Content PUBLIC 3 Enabling LDAP User Authentication............................................165 Managing the LDAP Server Configuration Object with SAP IQ..........................175 Managing LDAP User Authentication Login Policy Options............................190 Manage Users and Passwords with LDAP User Authentication.........................194 Displaying Current Status Information for a User...................................195 Displaying Current State for an LDAP Server Configuration Object......................195 2.2 Kerberos user authentication...................................................195 Kerberos clients..........................................................197 Setting up a Kerberos system................................................198 Configuring SAP IQ databases to use Kerberos (SQL)...............................199 Connections from an SAP Open Client or jConnect application.........................201 Connecting using SSPI for Kerberos logins on Windows..............................201 Troubleshooting: Kerberos connections.........................................202 Security: Use login modes to secure the database..................................204 2.3 Licensing Requirements for Kerberos.............................................205 2.4 PAM User Authentication......................................................205 Enabling PAM User Authentication............................................ 206 Sample PAM Authorization Program...........................................206 Sample PAM Configuration..................................................208 3 Advanced Security Options in SAP IQ...........................................209 3.1 Column Encryption in SAP IQ...................................................209 Licensing Requirements for Column Encryption................................... 210 Definitions of Encryption Terms...............................................210 Data Types for Encrypted Columns............................................ 210 LOAD TABLE ENCRYPTED Clause.............................................213 String Comparisons on Encrypted Text..........................................215 Database Options for Column Encryption........................................215 Encryption and Decryption Example............................................217 3.2 Kerberos Authentication Support in SAP IQ.........................................223 Licensing Requirements for Kerberos.......................................... 223 3.3 LDAP User Authentication Support in SAP IQ....................................... 223 License Requirements for LDAP User Authentication................................223 SAP IQ Administration: User Management and Security 4 PUBLIC Content 1 Security Management SAP IQ provides a role-based security model for controlling access