Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
SAP HANA Articles
Page 28 of 58
Single Sign-on configuration in SAP HANA system
SSO can be configured on below authentication methods −SAMLKerberosX.509 client certificates for HTTP access from HANA XS engineSAP Logon/Assertion tickets
Read MoreSearching a SAP HANA system in HANA Studio System view
When you are managing a large number of systems using HANA Studio, this can be used to find a specific system more quickly.To use find system option, the following steps should be performed −From the Systems view toolbar, choose the Find System (Find System) button.2. Enter a search string −You can also use “*” or “?” wildcards.It will display matching systemsSelect the system you were searching for.You can select several systems in the search results by pressing the CTRL key while selecting. You can use this, for example, to mark duplicate systems.Choose whether you want to open the selected system ...
Read MoreManaging password policy in SAP HANA system
The last folder in SAP HANA Studio system navigation is Security and it has 3 subfolders inside it that define the system security policy and user management activities −SecurityUserRolesSecurity tab is used to manage Password Policy in HANA system −
Read MoreUse of Restricted user in SAP HANA system
When you compare standard database users, restricted users have the following limitations −With restricted users, it is not possible to create objects in the database as they are not authorized to create objects in their own database schemaRestricted users are not authorized to view any data in the database as they are not granted the standard PUBLIC roleWith the use of restricted users, you can connect to the database using HTTP.
Read MoreLimitations covered by SAP HANA as compared to conventional database
Following are the key limitations that HANA overcomes −As data size is growing it is a big problem for companies to store huge amounts of data. You talk about any industry domain- healthcare, FMCG, Banking, and Insurance, as subscribers are increasing there is an increase in historical data with time. SAP HANA Column base storage allows data compression and hence reducing the cost of storing the data.As data size is growing it is a huge problem for companies to maintain and analyze the historical data. A conventional database doesn’t provide a mechanism to process large volumes of data. With an ...
Read MoreDefining user lock settings in SAP HANA
Yes, new for SPS7 is the Lock indefinitely radio button −
Read MoreConfiguring Password policy and Blacklist in SAP HANA Studio
Following privileges are required −You need to have the system privilege INIFILE ADMIN.You need to have the object privileges SELECT, INSERT, and DELETE for the _SYS_PASSWORD_BLACKLIST table (_SYS_SECURITY).
Read MoreCreate View SQL in SAP HANA database
>Create View View_name as Select Col1,Col2 From Table_name;In the above SQL statement, you are creating a view that contains Col1 and Col2 from the table.Table Name − Emp_InfoExampleIdEmplNameEmpluserEmplpasswordJoining_Date1Employee 1Emp1Emp1Pwd9/11/20162 Employee 2Emp2 Emp2Pwd 16/08/20153Employee 3Emp3Emp3Pwd15/09/20164Employee 4Emp4 Emp4Pwd 3/07/20145Employee 5Emp5Emp5Pwd10/09/20126Employee 6Emp6 Emp6Pwd 1/10/2013 To create a view, which contains only 3 columns you have to write->Create View View_EmpInfo As Select Id, EmplName,Joining_Date From Emp_Info;This view can be used by users to get Id, EmplName, and Joining_date.
Read MoreBenefits of using SAP HANA database views
Following benefits can be achieved using database views −To provide security −Using a view, you can select specific columns and assign access to the users. Users can only see the columns for which permissions are set on the view and not the underlying tables with full data.To hide Complexity −Consider a scenario where you need to join multiple tables using complex joins or calculations. All the coding can be put in database view and access can be provided.
Read MorePerforming different SAP logon check while connecting to HANA
When a user logins to the HANA system, the following steps are performed −Step 1 The system authenticates the user using the configured mechanism.Example − When User name/password authentication is being enforced, the provided user name and password are verified.Step 2The system verifies that the user's account is within its validity period.In the system view USERS, the columns VALID_FROM and VALID_UNTIL must contain effective values for the user in question.However, this is an optional parameter that a user administrator can set during user provisioning.Step 3The next step is system verifies that the user's account is active.This can be performed by checking ...
Read More