Application Development Discussions
Join the discussions or start your own on all things application development, including tools and APIs, programming models, and keeping your skills sharp.
cancel
Showing results for 
Search instead for 
Did you mean: 

PI/XI Security.

Former Member
0 Kudos

Hi there , as a security administrator , what are the ways in which you define security in PI/XI . Also , when defining roles do you generally go for SAP standard roles in ABAP/Java stacks. How do you go about it. If anyone who has implemented XI security , could you please contribute . Thanks in advance.

-Priya

1 ACCEPTED SOLUTION

Former Member
0 Kudos

Almost all your security admin work in PI will be during the initial setup of the basis (the usual stuff such as profile parameters, plus some PI specific things) and the various connectors, proxies, services, encryption (e.g. renaming the standard service users for better transparency, etc). Almost everything is standard but you might want to create roles of your own for user admin, authorization development and setting up some config (PRGN_CUST, SUGR, etc) and perhaps a display security role for the support team / auditors / checking security logs, etc.... as per your requirements.

Basically, there is not much to do other than getting some important things right in the beginning, which can involve a lot of clever-type-of-work.

Cheers,

Julius

5 REPLIES 5

Former Member
0 Kudos

Almost all your security admin work in PI will be during the initial setup of the basis (the usual stuff such as profile parameters, plus some PI specific things) and the various connectors, proxies, services, encryption (e.g. renaming the standard service users for better transparency, etc). Almost everything is standard but you might want to create roles of your own for user admin, authorization development and setting up some config (PRGN_CUST, SUGR, etc) and perhaps a display security role for the support team / auditors / checking security logs, etc.... as per your requirements.

Basically, there is not much to do other than getting some important things right in the beginning, which can involve a lot of clever-type-of-work.

Cheers,

Julius

0 Kudos

Thanks Julius.

0 Kudos

Can someone go into more details . Thanks .

0 Kudos

This might help.

0 Kudos

>

> This might help.

>

>

That link points to this forum. I assume that you were viewing a specific thread but used the URL address bar (which is different most of the time). Rather right-click the "Thread" and copy that (via the properties or as a shortcut to the clipboard.

On the other-hand, perhaps you were suggesting searching? I am not aware of any such thread here which provide a "cook-book" for PI security, but some articles and blogs and security guides on service.sap.com will have some information in them.

@ Priya: In the meanwhile, if you ask specific questions, then chances are good that they can be answered specifically.

Cheers,

Julius