cancel
Showing results for 
Search instead for 
Did you mean: 

Security features of VDS?

Former Member
0 Kudos

Hello there,

Our security officer has expressed a concern about the connectivity from HCM to IDM through VDS. As far as I can see the only possibillty there is to differentiate users that are setup in VDS are whether they are authenticated or not. An authenticated user in VDS appears to be restrictable to certain ip-addresses, but is it possible to restrict a user to read only? How is the password transmitted from HCM to VDS? Is it in clear text? I guess not since passwords in SAP systems are generally stored in encrypted form, but if anyone out there has an answer, I would appreciate it.

The connection from VDS to IDM seems to be controlled by the SQL-server autorisation model.

Best regards,

Anders

Accepted Solutions (1)

Accepted Solutions (1)

Former Member
0 Kudos

Anders,

You can have VDS prove authentication in a number of ways as you have discovered. These users can be split into different groups based on access and then give them different rules, where you can dictate what rights they have.

In your VDS configuration you can list each group and what rule it should follow.

Hope this helps,

Matt

Answers (0)