Security Guide SAP Integrated Business Planning Document Version: 1.0 – 2015-03-10 SAP Integrated Business Planning 5.0 CUSTOMER Copyright © 2015 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices. 2 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Copyright Typographic Conventions Type Style Description Example Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Textual cross-references to other documents. Example Emphasized words or expressions. EXAMPLE Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. Example Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Example Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation. <Example> Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. EXAMPLE Keys on the keyboard, for example, F 2 or E N T E R . SAP Integrated Business Planning 5.0 Typographic Conventions CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 3 Document History 4 Version Date Change 1.0 2015-03-10 Initial version CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Document History Contents 1 Introduction ....................................................................................................................................................6 2 Technical System Landscape .......................................................................................................................8 3 3.1 3.2 3.3 Security Aspects of Data, Data Flow and Processes ............................................................................... 10 Communication Channel Security ....................................................................................................................... 10 Communication Destinations ............................................................................................................................... 10 Data Integration ......................................................................................................................................................11 HANA Cloud Integration .........................................................................................................................................11 Data Upload Using the Data Integration App .......................................................................................................11 Uploading Files to the IBP Add-In for Microsoft Excel .........................................................................................11 Data Export by REST-based API........................................................................................................................... 12 Web Browser – Cloud Solution Communication ................................................................................................ 12 4 4.1 4.2 User Management and Authentication ...................................................................................................... 13 User Management ................................................................................................................................................. 13 Integration into Single Sign-On Environments .................................................................................................... 13 5 5.1 5.2 5.3 Authorizations .............................................................................................................................................. 15 Initial User Provisioning ......................................................................................................................................... 15 Standard Roles ....................................................................................................................................................... 15 Standard Authorization Objects ........................................................................................................................... 18 6 Session Security Protection ...................................................................................................................... 24 7 7.1 7.2 7.3 7.4 Data Protection and Data Privacy ..............................................................................................................25 Deletion of Personal Data ..................................................................................................................................... 26 Sensitive Personal Data ....................................................................................................................................... 26 Disclosure of the Personal Data of Individuals ................................................................................................... 26 SAP Jam Integration ..............................................................................................................................................27 SAP Integrated Business Planning 5.0 Contents CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 5 1 Introduction Target Audience This security guide provides an overview of the security-relevant information that applies to SAP Integrated Business Planning 5.0. The target groups of this security guide are the following: Key users of SAP Integrated Business Planning Administrators User administrators Why Is Security Necessary? With the increasing use of distributed systems and the internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to SAP Integrated Business Planning. To assist you in securing the applications of SAP Integrated Business Planning, we provide this security guide. Overview of the Main Sections The Security Guide comprises the following main sections: Technical System Landscape This section provides an overview of the technical components and communication paths that are used by SAP Integrated Business Planning. Security Aspects of Data, Data Flow and Processes This section provides an overview of security aspects involved in the most widely-used processes within SAP Integrated Business Planning and the security aspects of data integration. User Management and Authentication This section provides an overview of the following user administration and authentication aspects: o User types that are required by SAP Integrated Business Planning o Overview of how integration into Single Sign-On environments is possible Authorizations This section provides an overview of the authorization concept that applies to SAP Integrated Business Planning, and lists the standard roles and authorization objects delivered by SAP. Session Security Protection This section provides information about activating secure session management, which secures access to the SAP logon ticket and security session cookies 6 Data Protection and Data Privacy CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Introduction This section provides information about how SAP Integrated Business Planning protects personal or sensitive data. SAP Integrated Business Planning 5.0 Introduction CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 7 2 Technical System Landscape SAP Integrated Business Planning 5.0 is a cloud offering that runs in the SAP Public Cloud. Since cloud solutions from SAP deal with business data from your core business processes, SAP adheres to the highest security and quality requirements, as follows: The business data is stored securely in SAP data centers. Users who require access to the business data must authenticate themselves, and their identity must be verified by user and access management. Users can only perform actions for which they have authorizations. Customer data always belongs to the customer. You can access your SAP Integrated Business Planning cloud solution with the following devices: Desktop computer: browser-based internet access from your network Portable computers Mobile devices Access to cloud solutions from SAP is provided through a unique and customer-specific URL. Communication is implemented by means of a reverse proxy component in the SAP data center. The reverse proxy is the SAP Web Dispatcher, which is developed and maintained by SAP Cloud Support. The communication between the devices and the SAP Cloud is secured and protected by state-of-the-art open cryptographic standards and protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS). The clients and the SAP Integrated Business Planning system communicate through an add-in for Microsoft Excel and a web browser. SAP Integrated Business Planning also integrates with SAP HANA Cloud Integration (SAP HCI). SAP HCI directly connects to on-premise systems to extract and securely move data from source systems to SAP Integrated Business Planning target tables through HTTPS. SAP HCI can also be used for exporting SAP Integrated Business Planning calculation scenarios. Furthermore, SAP Integrated Business Planning integrates with SAP Jam, thus providing a collaborative decisionmaking solution that brings together people, information, and proven business approaches to drive fast and valuable results. SAP Jam enables you to collaborate with other members of your team and to keep track of your processes and process-related tasks. The communication between SAP Integrated Business Planning and SAP Jam is secured by HTTPS. ETL tools can receive SAP Integrated Business Planning key figures for consumption through a RESTful web service API via HTTPS. SAP Integrated Business Planning is powered by SAP HANA. All customer data is stored in the HANA database and data is protected by the security infrastructure and operational procedures of SAP Cloud powered by SAP HANA. The figure below shows the main components of SAP Integrated Business Planning. Identity and Authentication Management (IAM), as well as Authorization Management are based on SAP NetWeaver technology. The figure below shows an overview of the technical system landscape for SAP Integrated Business Planning 5.0. 8 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Technical System Landscape For more information regarding the components and functions of SAP Integrated Business Planning, see the application help for SAP Integrated Business Planning at http://help.sap.com/ibp50. SAP Integrated Business Planning 5.0 Technical System Landscape CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 9 3 Security Aspects of Data, Data Flow and Processes 3.1 Communication Channel Security The table below shows the communication channels used by SAP Integrated Business Planning, the protocol used for the connection, and the type of data transferred. All communication channels (HTTP) support channel encryption (HTTPS) trough TLS and SSL protocols. Communication Path Protocol Used Type of Data Transferred Data Requiring Special Protection Front-end client using a web browser to Gateway /SAP Integrated Business Planning HTTPS All application data All confidential data Excel client to SAP Integrated Business Planning HTTPS All application data All confidential data HANA Cloud Integration HTTPS All application data All confidential data SAP Jam HTTPS Social media integration Personal data, confidential data 3.2 Communication Destinations The table below shows an overview of the communication destinations used by SAP Integrated Business Planning. Destination Type Description User, authorizations Source system (connection via HCI) HTTPS Data import using HANA Cloud Integration Data import user (technical user) File upload using the Data Integration app HTTPS File upload in CSV Format Special authorizations are required (see chapter Authorizations) SAP Jam HTTPS Collaboration Business user 10 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Security Aspects of Data, Data Flow and Processes 3.3 Data Integration To be able to fully exploit the functions provided by SAP Integrated Business Planning, you can integrate business processes and data between your on-premise applications (for example, SAP ERP or SAP APO) and SAP Integrated Business Planning. This section provides an overview of the security aspects of data integration. HANA Cloud Integration The HANA Cloud Integration tool enables users to import data to and export data from SAP Integrated Business Planning. For information about the security aspects of these data flows, see the HANA Cloud Integration security guide on SAP Help Portal at http://help.sap.com/hci_ds/. Data Upload Using the Data Integration App You can use the Data Integration app to upload data to SAP Integrated Business Planning in a CSV file or using an FTP client. The special authorizations required for data uploads are contained in specific standard front-end and back-end roles delivered by SAP. For more information, see chapter Authorizations. For general information about authorizations, see the application help on SAP Help Portal at http://help.sap.com/ibp50/. Uploading Files to the IBP Add-In for Microsoft Excel The IBP Add-In for Microsoft Excel allows users to save planning views to their computers, make changes to the files offline, and upload the files back to the system. Users can also share excel sheets (favorites or templates) with other users. During uploads, the Excel content gets converted into an internal format. During the upload to and download from the backend, no virus scan is performed on the Excel content. With the sharing function, it is theoretically possible to spread virus infections from one device to the other. To avoid that, it should be ensured that all devices on which the Excel clients for SAP Integrated Business Planning are running have local virus scanners in place. To avoid damages caused by virus-infected files, users should perform a virus scan on the files before uploading them. When users share favorites with other users, the system temporarily erases all figures for security reasons. When a recipient opens a shared favorite, the system checks for the required authorizations before loading the figures. For more information about favorites, see the application help on SAP Help Portal at http://help.sap.com/ibp50/ Application Help Interactive Planning in Microsoft Excel Creating Planning View Favorites. SAP Integrated Business Planning 5.0 Security Aspects of Data, Data Flow and Processes CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 11 Data Export by REST-based API You can use a REST-based API for exporting data from SAP Integrated Business Planning. To authenticate and invoke this RESTful service, users must have authorization to view all planning data for the source planning area. For more information, see the Data Export Guide for SAP Integrated Business Planning on SAP Help Portal at http://help.sap.com/ibp50/. Web Browser – Cloud Solution Communication All communication between the web browser/clients and the cloud solution is encrypted and authenticated based on standard SSL and TLS protocols. 12 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Security Aspects of Data, Data Flow and Processes 4 User Management and Authentication User management and authentication in SAP Integrated Business Planning 5.0 is based on the mechanisms provided with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server ABAP. 4.1 User Management In SAP Integrated Business Planning, user management functions are available for users in the form of dedicated apps which users can access from the SAP Fiori launchpad. For more information, see the application help on SAP Help Portal at http://help.sap.com/ibp50. User Types The following table lists the user types that are required for SAP Integrated Business Planning: User Type Description Business user A user type for normal interactive users. Business users always have to change their initial password during the first logon. The properties of the passwords are determined by the assigned security policy. Note Users can only change their initial passwords on the logon screen of the launchpad, but not in Microsoft Excel. Technical user A user type for non-interactive usage, either predefined by SAP for technical operations, or resulting from the creation of communication arrangements. Support user A user type for interactive support used by SAP Cloud Services to access the system as part of incident processing. 4.2 Integration into Single Sign-On Environments SAP Integrated Business Planning supports authentication mechanisms provided by SAP NetWeaver. Anonymous access is not supported. To log on to your SAP Integrated Business Planning system, the following authentication methods are supported: SAP Integrated Business Planning 5.0 User Management and Authentication CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 13 Logon using user ID and password. By default, a strong security policy for passwords is pre-configured in your solution, based on SAP’s product security standard. You as a user administrator can set an initial password for new users. Logon using SAML 2.0 assertion for front-end Single Sign-On (SSO) SAP Integrated Business Planning supports the use of logon tickets for SSO when using a web browser as the front-end client. In this case, users can be issued a logon ticket after they have authenticated themselves with the initial SAP system. The ticket can then be submitted to other systems (SAP or external systems) as an authentication token. The user does not need to enter a user ID or password for authentication but can access the system directly after the system has checked the logon ticket. Logon using client certificate (X.509) as logon certificate As an alternative to user authentication using a user ID and passwords, users using a web browser as a frontend client can also provide X.509 client certificates to use for authentication. In this case, user authentication is performed on the web server using the Secure Sockets Layer Protocol (SSL Protocol) and no passwords have to be transferred. User authorizations are valid in accordance with the authorization concept in the SAP system. The IBP Add-In for Microsoft Excel supports user authentication by a client certificate. You can specify the certificate to be used when setting up a connection to the server. In the Edit Connection dialog box select the Client Certificate checkbox, choose Select Certificate and select the relevant certificate (corresponding to your SNC name). The SNC name needs to be specified for each user created in the User Management app, under SNC Data on the SNC tab page. 14 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 User Management and Authentication 5 Authorizations SAP Integrated Business Planning uses the authorization concept provided by the SAP NetWeaver AS ABAP. The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For more information about roles and authorizations, see the application help on SAP Help Portal at http://help.sap.com/ibp50. 5.1 Initial User Provisioning You are provided with a super user for SAP Integrated Business Planning, which has all the necessary authorizations for setting up your system. With this user, you can create your users and assign the required roles. Please note that you should not use this super user in a productive environment. Once you have finished setting up your users and roles, the super user should be deactivated. 5.2 Standard Roles SAP delivers standard roles containing the authorizations needed for using the applications of SAP Integrated Business Planning, including web-based applications (apps) and the IBP Add-In for Microsoft Excel. For general information about using and changing standard roles, see the application help on SAP Help Portal at http://help.sap.com/ibp50. Users of a web-based application need both front-end authorizations (to have access to the launchpad tile) and back-end authorizations (to be able to use functions and to have access to data). The following table lists the standard roles containing the authorizations for using the various applications and accessing data in SAP Integrated Business Planning. Standard Roles Business Role/Use Front-End Role Authorizations Back-End Role Authorizations Demand planner Demand Planner – Apps Authorization for accessing the following apps on the launchpad: Back-End Role for Manage Demand Sensing Issues App Authorizations required for using the Manage Demand Sensing Issues app SAP_IBP_BCR_DE MANDPLANNER_T - Manage Demand Sensing Issues - Manage Forecast Models SAP_IBP_DMDSENS_MON _APP Back-End Role for Manage Forecast Models App SAP_IBP_MFM_MAN_APP SAP Integrated Business Planning 5.0 Authorizations Authorizations required for using the Manage Forecast Models app CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 15 Business Role/Use Front-End Role Authorizations Back-End Role Authorizations Custom alert administrator Custom Alerts – Apps Authorization for accessing the following apps on the launchpad: Back-End Role for Define Custom Alerts App Authorizations required for using the Define Custom Alerts app SAP_IBP_BCR_ALE RT _T SAP_IBP_ALERT_DEF_APP - Define Custom Alerts - Subscribe to Custom Alerts - Monitor Custom Alerts Back-End Role for Subscribe to Custom Alerts App SAP_IBP_ALERT_SUB_APP Back-End Role for Monitor Custom Alerts App SAP_IBP_ALERT_MON_AP P General planner General Planner – Apps SAP_IBP_BCR_PLA NNER_T Authorization for accessing the following apps on the launchpad: Back-End Role for General Planner SAP_IBP_PLANNER_APP - Dashboard - Analytics - Change History Authorizations required for using the Subscribe to Custom Alerts app Authorizations required for using the Monitor Custom Alerts app Authorizations for the following: using all algorithms in the add-in for Microsoft Excel - Creating and managing scenarios in the add-in for Microsoft Excel - Cases - Tasks - Favorites - Collaboration - Using the following apps: - Dashboard - Analytics - Change History - Cases - Tasks - Favorites - Collaboration Administrator Administrator – Apps SAP_IBP_BCR_AD MIN_T Authorization for accessing the following tiles on the launchpad: - Data Integration - Process Modeling - Configuration - Transport Planning 16 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. Back-End Role for Administrator SAP_IBP_ADMIN_APP Authorizations for managing catalogs, groups, and tiles using the launchpad designer - Using all SAP Integrated Business Planning 5.0 Authorizations Business Role/Use Front-End Role Authorizations Back-End Role Models Authorizations functions of the add-in for Microsoft Excel - Download Excel AddIn - Using functions of the following apps: - Data Integration, - Process Modeling - Configuration - Transport Planning Models User administrator User Administrator – Apps SAP_IBP_BCR_US ERADMIN_T Authorization for accessing the following apps on the launchpad: Back-End Role for User Administrator SAP_IBP_USRADM_APP - User Management Authorizations required for user administration functions - Roles - Visibility Filters Basic functions Basic Functions – Apps SAP_IBP_BCR_BA SIC_T Authorization for accessing the following tiles: Back-End Role for Basic Functions SAP_IBP_BASIC - User Profile and for editing the user’s own user data in the User Preferences app - Application Help All applications SAP Role for IBP All Apps SAP_IBP_TCR_T Data access SAP Integrated Business Planning 5.0 Authorizations Technical role; authorization for accessing all apps on the launchpad Authorizations required for accessing the launchpad Back-End Role for All Applications SAP_IBP_ALL_APP Back-End Role for Data Access All application authorizations required for using the Add-In for Microsoft Excel and all apps of SAP Integrated Business Planning. This role should not be assigned to any user in a productive environment. All authorization objects related to CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 17 Business Role/Use Front-End Role Authorizations Back-End Role Authorizations SAP_IBP_DATA_ACCESS data access, with no authorization data specified. By defining values for these authorization objects, you can control access to data. Back-End Role for Accessing All Data All authorizations related to accessing data in SAP Integrated Business Planning SAP_IBP_DATA_ACCESS_ ALL 5.3 Standard Authorization Objects The table below lists the standard authorization objects provided for SAP Integrated Business Planning. You can use these objects to define your own roles in the Roles app. For information, see the application help on SAP Help Portal at http://help.sap.com/ibp50. Standard Authorization Objects Authorization Object Object Description Field Field Description Possible Values IBP_OPERTR Controls authorization for using algorithms in the add-in for Microsoft Excel ALGORITHM Values for this field specify the range of algorithms the user can use in the addin for Microsoft Excel. STAT_FCST (Statistical Forecasting) Controls authorization for attribute combinations ACTVT Activity 01 (Create or Generate): Allows users to add new combinations of attribute values to a planning view in the addin for Microsoft Excel (Algorithms) IBP_ATTRIB (Attribute Combinations) INV_OP (Inventory Optimization) SPLY_PLN (Supply Planning) 06 (Delete): Allows the deletion of attribute value combinations from a planning view in the add- 18 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Authorizations Authorization Object Object Description Field Field Description Possible Values in for Microsoft Excel IBP_HIST (Change History) IBP_IMPRT (Data Import) Controls authorization for the change history function ACTVT Controls authorization for the data integration function ACTVT Activity 23 (Maintain): Allows access to the change history function Activity 03 (Display): Allows users to display data load reports on the Data Integration user interface 16 (Execute): Allows data import into the application using a .zip file containing your manifest (.xml) and data files (.csv) IBP_MODEL (Model Configuration) IBP_FCSMOD (Forecast Model Management) Controls authorization for model configuration functions ACTVT Controls authorization for specific forecast models within a planning area ACTVT Activity 03 (Display): Allows the display of planning models in the Configuration app Activity 02 (Change): Allows users to change an existing forecast model or to create a new forecast model 03 (Display): Allows users to display existing forecast models 16 (Execute): Allows forecasting with the forecast models specified either in a simulation or in the background IBP_KEYFIG (Key Figures) SAP Integrated Business Planning 5.0 Authorizations Controls authorization for specific key figures within a planning IBP_PLAREA Planning Area IBP_FCSTMO Forecast Model Name ACTVT Activity 03 (Display): Allow users to display key figures within a planning area CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 19 Authorization Object Object Description Field Field Description area. Possible Values 23 (Maintain): Allow users to change key figures within a planning area IBP_MD (Master Data Management) Controls authorization for master data. IBP_PLAREA Planning Area IBP_KFID Key Figure ID ACTVT Activity 03 (Display): Allows the user to view master data in the addin for Microsoft Excel 23 (Maintain): Allows the user to add or copy master data in the add-in for Microsoft Excel IBP_PVIEW (Planning View Personalization) Controls authorization regarding planning view templates and layouts in the addin for Microsoft Excel ACTVT Activity 23 (Maintain) IBP_PV_OBJ Planning View Object TEMPLATE (Planning View Template): Allows the user access to the functions of the Template Admin group in the IBP ribbon of the add-in for Microsoft Excel LAYOUT (Planning View Layout): Allows the user access to the functions of the Layout tab in the Planning View Settings dialog in the add-in for Microsoft Excel IBP_PRCESS (Process Modeling) IBP_RESCOD (Reason Codes) 20 Controls authorization for using the process modeling function ACTVT Controls authorization for using specific IBP_RESCOD Activity 23 (Maintain): Allows the user to access the process modeling function to create planning process templates, instances, work flows, and steps. CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. Reason Code ID The values defined for this field control the range of reason codes that a user is allowed to SAP Integrated Business Planning 5.0 Authorizations Authorization Object Object Description Field Field Description reason codes IBP_SNPSHT (Snapshots) Controls authorization regarding snapshot generation. Possible Values use in the add-in for Microsoft Excel. ACTVT Activity 07 (Activate, generate): Allows the user to generate snapshots of key figures 08 (Execute again): Allows the user to redo snapshots, overriding the most recent data captured by a previous snapshot with the current values IBP_SCNRIO (User-Defined Scenarios) IBP_KF_VER (Version-Dependent Key Figure Permissions) Controls authorization for user-defined scenarios ACTVT Controls versiondependent permissions for viewing and editing key figures. IBP_ACTVT To use versiondependent permissions, you need to activate them in the Configuration app, under Manage Global Configurations (parameter group SCENARIO, parameter name PERMISSIONS). SAP Integrated Business Planning 5.0 Authorizations Activity 23 (Maintain): Allows the user to create or manage scenarios using the corresponding buttons in the Scenario group of the IBP ribbon in the add-in for Microsoft Excel. Activity I1 (View): Allows users to view key figures in the version specified. The users can only view the key figures for which they have a view permission defined in the authorization object IBP_KEYFIG (Key Figures). I2 (Scenario Edit): Allows users to save changes to user-defined scenarios I3 (Edit): Allows users to save changes to the version specified and the base version. The users can only edit the key figures for which they have an edit permission defined in the authorization object IBP_KEYFIG (Key CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 21 Authorization Object Object Description Field Field Description Possible Values Figures). IBP_MD_VER (Version-Dependent Master Data Permissions) Controls versiondependent master data permissions. IBP_PLAREA Planning Area IBP_VRSIO Version ID IBP_ACTVT Activity I1 (View): Allows the user to display master data records in the version specified The global master data permissions specified in the authorization object IBP_MD (Master Data Management) override the version-dependent permissions. I4 (Manage Records): Allows the user to display, create, update and delete all master data records in the version specified I5 (Edit Records): Allows the user to display and update all master data records in the version specified I6 (Manage Own Records): Allows the user to display all records, to create records, and to update and delete the user's own records in the version specified IBP_MDTYP Planning Object Type IBP_PLAREA Planning Area IBP_VRSIO Version ID ACTVT Activity (Versions) Controls authorization for version management IBP_VISFLT Controls IBP_VF_ID IBP_VRSIO 22 23 (Maintain): Allows the user to promote a planning version to the base version, copy the base version to a version, and to display the status of version processes in the add-in for Microsoft Excel. CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. Visibility Filter ID The visibility filter SAP Integrated Business Planning 5.0 Authorizations Authorization Object Object Description (Visibility Filters) authorization for viewing master data in the form of visibility filters SAP Integrated Business Planning 5.0 Authorizations Field Field Description Possible Values specified in this field controls the range of master data visible to a user for a particular planning area. CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 23 6 Session Security Protection Users of SAP Integrated Business Planning run the applications in the SAP Fiori launchpad. The launchpad encapsulates SAP NetWeaver session management that secures access to the SAP logon ticket and security session cookies. Secure Sockets Layer (SSL) is used to protect the network communications where these security-relevant cookies are transferred. Idle sessions are terminated automatically. 24 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Session Security Protection 7 Data Protection and Data Privacy Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different countries. This section describes the specific features and functions that SAP provides to support compliance with the relevant legal requirements and data privacy. This section and any other sections in this Security Guide do not give any advice on whether these features and functions are the best method to support company, industry, regional or country-specific requirements. Furthermore, this guide does not give any advice or recommendations with regard to additional features that would be required in a particular environment; decisions related to data protection must be made on a case-bycase basis and under consideration of the given system landscape and the applicable legal requirements. Note In the majority of cases, compliance with data privacy laws is not a product feature. SAP software supports data privacy by providing security features and specific data-protection-relevant functions such as functions for the simplified blocking and deletion of personal data. SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not taken from any given legal source. Glossary Term Definition Personal data Information about an identified or identifiable natural person. Business purpose A legal, contractual, or in other form justified reason for the processing of personal data. The assumption is that any purpose has an end that is usually already defined when the purpose starts. Blocking A method of restricting access to data for which the primary business purpose has ended. Deletion Deletion of personal data so that the data is no longer usable. Retention period The time period during which data must be available. End of purpose (EoP) A method of identifying the point in time for a data set when the processing of personal data is no longer required for the primary business purpose. After the EoP has been reached, the data is blocked and can only be accessed by users with special authorization. Some basic requirements that support data protection are often referred to as technical and organizational measures (TOM). The following topics are related to data protection and require appropriate TOMs: Access control: Authentication features as described in section User Management and Authentication [Page 13]. Authorizations: Authorization concept as described in section Authorizations [Page 15]. Communication security: as described in section Security Aspects of Data, Data Flow and Processes [Page 10]. SAP Integrated Business Planning 5.0 Data Protection and Data Privacy CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 25 Availability control as described in section Technical System Landscape [Page 8] Separation by purpose: is subject to the organizational model implemented and must be applied as part of the authorization concept. Caution The extent to which data protection is ensured depends on secure system operation. Network security, security note implementation, adequate logging of system changes, and appropriate usage of the system are the basic technical requirements for compliance with data privacy legislation and other legislation. 7.1 Deletion of Personal Data SAP Integrated Business Planning might process data (personal data) that is subject to the data protection laws applicable in specific countries. All kinds of data that is extracted into SAP Integrated Business Planning and all business planning data that relates to personal data can be deleted using the standard functions provided by SAP Integrated Business Planning. You can first delete the business plans related to personal data, and afterwards the personal master data as well. For more information about the deletion of planning data and master data, see the application help for SAP Integrated Business Planning on SAP Help Portal at http://help.sap.com/ibp50. Note that only planning data/master data of views that are connected to the SAP Integrated Business Planning back end can be securely deleted from the databases in SAP Integrated Business Planning. For this reason you should make sure that Excel sheets that contain business planning data in general and personal data specifically should be secured by the security mechanisms of Microsoft Office (for example password protection) and the client operative system (such as hard drive encryption). Also common client protection tools such as virus scanners on the clients are highly recommended. 7.2 Sensitive Personal Data Sensitive personal data is a category of personal data that needs special handling. The definition of what qualifies as sensitive personal data may differ for different legal areas or industries. Sensitive data may for example be information on racial or ethnic origin, political opinions, or bank and credit accounts. SAP Integrated Business Planning is not designed to store and process this kind of data. 7.3 Disclosure of the Personal Data of Individuals Data privacy regulations may also require the provisioning of information on what is stored about an individual person. The standard functions of SAP Integrated Business Planning can be used for this purpose. 26 CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. SAP Integrated Business Planning 5.0 Data Protection and Data Privacy 7.4 SAP Jam Integration SAP Integrated Business Planning enables integration with SAP Jam. This channel allows you to share business objects and documents that may contain sensitive information with external users. For information about protecting this data, see SAP Help Portal at http://help.sap.com/nw-uiaddon -> Application Help. In SAP Library choose Social Media Integration -> Information for Administrators -> Security. SAP Integrated Business Planning 5.0 Data Protection and Data Privacy CUSTOMER © 2015 SAP SE or an SAP affiliate company. All rights reserved. 27 www.sap.com/contactsap © 2015 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see http://www. sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices.
© Copyright 2026