Skip to Content
Technical Articles

GRC 12.0 – Emergency Access Management (EAM) for HANA Target Systems (using Web IDE)

Purpose of the Document

It’s HANA everywhere šŸ™‚

In the latest version of GRC which is 12.0,Ā  SAP has extended the emergency access management (EAM) functionality to HANA target systems via Web IDE.

At present, there is no option in GRC 12.0 to use EAM functionality for HANA DB without WEBIDE

This blog is to provide the details on how this new functionality can be configured and utilized to manage the firefighting access to HANA target systems.

Let’s see how you can setup this functionality and can test in GRC 12.0 system (End to End).

Required Configuration to enable EAM for HANA DB

HANA Connection Configuration

Create HANA database connection in GRC system using transaction code DBCO (Database Connection Maintenance)

DB Connection: Fill in the DB Connection name. This name will be used in the connector setup so name it accordingly.
DBMS: Select the type of Database Management System as “HDB” (HANA Database)
User Name and Password: Valid user authentication details to connect to HANA DB
Connection Info: HANA database system details (Hostname details along with Port Number)

Save the database connection after entering all required details as mentioned above.

Testing HANA DB Connection created in GRC

HANA database connection can be tested usingĀ ABAP report “ADBC_TEST_CONNECTION”

Execute transaction SE38 and run report “ADBC_TEST_CONNECTION”

HANA DB connection can also be verified using the transaction “DBACOCKPIT” .

HANA Database Connector in SM59

Create a connector in SM59 with connection type as “L” (Logical Destination) and connector name same as the connection created in DBCO.

Audit Policy Configuration in HANA DB

Activities on SAP HANA database (User Changes, Role Changes, Creation or deletion of database objects, Changes to system configuration, Access to or changing of sensitive information) can be track and recorded via in-built Audit configuration feature.

SAP HANA database auditing feature allows monitoring of the activities performed in HANA DB.To make use of this feature, SAP HANA audit policy must be activated on HANA DB.

SAP recommendation is to create separate audit policies for following activities performed in HANA DB separately:

  • Granting and Revoking of Authorization
  • Session Management and System Configuration
  • Structured Privilege Management
  • User and Role Management

User and Role Management

Structured Privilege Management

Session Management and System Configuration

Granting and Revoking of Authorization

HANA Connector Config Setup in GRC

Define connectors in the following IMG path

SPRO -> IMG -> GRC -> Common Component Settings -> Integration Framework -> Maintain Connectors and Connection Types -> Define Connectors

Define connector groups in the following IMG path and assign HANA DB connectors to this connector group

SPRO -> IMG -> GRC -> Common Component Settings -> Integration Framework -> Maintain Connectors and Connection Types ->Define Connector Groups

Maintain Connection Settings

Connectors must be assigned to the all integration scenarios (AM, ROLMG, SUPMG, AUTH, PROV) available as it is a good practice.

SPRO -> IMG -> GRC -> Common Component Settings -> Integration Framework -> Maintain Connection Settings

Maintain Connector Settings

Maintain connector settings in the following path and assign HANA Audit Policy and HANA IDE URL to the HANA DB connectors as shown in the following screenshots.

SPRO -> IMG -> GRC -> Access Control -> Maintain Connector Settings

HANA WEB IDE URL

Web IDE for SAP HANA is a browser-based IDE for the development of SAP HANA-based applications.

This web-based IDE is called SAP HANA Web-based Development Workbench, which contains four modules.

Editorļ¼šManage HANA repository artifacts
Catalogļ¼šManage HANA DB SQL catalog artifacts
Securityļ¼šUser and Role Management
Traceļ¼šSet or download trace files for HANA applications

EAM firefighting for HANA target systems is supported only through HANA Web IDE and this is the main reason for including the IDE URL as one of the attributes in the connector settings as firefighting session will launch HANA IDE URL using which the firefighting actvities will be performed.

Delivery Unit deployment in HANA DB

Delivery Unit deployment into HANA DB and activating the SQL procedures under AC folder in HANA DB is a prerequisite and must be followed according to the steps mentioned in following SAP Note:

https://launchpad.support.sap.com/#/notes/1869912

 

GRC Procedures Activation

For details on how the corresponding SQL procedures under ARA and ARQ folders are required to be activated are available in SAP Note 1869912.

SQL Procedures under ARA folder – Just execute in any sequence

SQL Procedures under ARQ folder – Execute procedures starting with ‘IS’ or ‘INS’ first followed by procedures starting with GRANT and REVOKE and finally remaining procedures.

“GET_USERS_SYNC” procedure has an updated version released through the following SAP Note. Hence, download this from the note and activate it as it is not updated in the latest version by default.

2451688 – Repository sync job not syncing back user validity dates from HANA

However, there are few errors which you will come across during SQL procedures activation like mentioned below but still you can proceed with your next steps.

Firefighter ID Setup in HANA DB

Step 1: I have created a role in HANA DB with the same name as the one used in config parameter 4010 (Firefighter ID role name).

Step 2: Created a User ID in HANA DB and assigned the role created in previous step to the User ID and to make GRC system recognize the newly created User ID as Firefighter ID.

GRC Repository Object Sync

Execute “Repository Object Sync” program once all the above configuration is completed which should successfully sync the USERS and ROLES from HANA DB to GRC system

Assignment of FF ID Owner and Controller to HANA Firefighter ID

Another improvement in GRC 12.0 is simplified Firefighter Owner/Controller maintenance:

– In 10.1 User ID must be first defined as FF ID Owner or Controller before assigning to a Firefighter ID.

– In GRC 12.0 Owners and Controllers can be assigned to Firefighter ID even when the User ID is not maintained in Access Control Owners. This is applicable for “Mass Maintenance” feature as well.

EAM Centralized Vs. Decentralized Firefighting for HANA DB

Decentralized scenario is currently not supported for HANA target systems.Only Centralized Firefighting is supported and Firefighter logon must be done via transaction GRAC_EAM/GRAC_SPM in the GRC Foundation system as the logic to generate the password for the Firefighter ID is implemented in GRC system only.You can verify the details in the following SAP Note

Common Errors

When a User ID is created in HANA DB which you want use as a Firefighter ID please ensure that the length of the User ID is not more than 12 characters. If the Firefighter ID length is more than 12 characters, following error message will be shown when you try to start the FF sessionĀ as EAM functionality is not supported.

EAM Centralized Firefighting process for HANA systems

If you have completed all the above steps successfully then you can perform EAM testing for HANA target systems.

Step 1: Execute transaction “GRAC_EAM” in your GRC system as you can use only Centralized Scenario

Step 2: Click on “Logon” button and enter the required details and click “Continue” to launch the Firefighting session

Step 3: HANA IDE URL which has been configured during Connector Setup will be launched and will redirect to the logon screen.

Firefighter ID status will be showing as “GREEN” until you login to HANA IDE.

You have to enter the Firefighter ID and the password (you have to just paste the password which is already copied into clipboard. Just do CTRL+V in password field) after which your Firefighting session will begin and the status of Firefighter ID in the EAM launchpad screen will turn to red

Step 4: Perform required activities in HANA system and once completed log off the Firefighting session.

Step 5: All the logs recorded during Firefighting session can be accessed from HANA table AUDIT_LOG. The same logs will be retrieved and showed in the EAM log review workflow request.

Step 6: After the completion of firefighting session, execute EAM log sync job which will retrieve the logs from HANA system and creates the log review workflow request.

Key Points to note:

You can check following SAP Note for FAQs about this functionality.

Issue 1: Password getting copied to clipboard: If the password is copied to clipboard then this can be shared with anyone and there is potential chance FF ID misuse by an unauthorized user.

Currently working with SAP support to check if time limit can be set for password expiry.

e.g. To make password in clipboard unusable after 10 to 15 seconds. This could be a compensating control from security perspective.

Issue 2: When logging to HANA IDE through EAM ensure that no other HANA IDE session with normal User ID is ACTIVE.Ā  If any session is ACTIVE then system redirects to the same session instead of starting new session

Issue 3: During the FF session always ensure to properly logout the session after completion. If the HANA IDE is closed directly without logging out properly then the FF session will remain active until the time out period set for HANA IDE is reached.

Thanks for reading.

Looking forward for your inputs in improving this blog with additional details or scenarios šŸ™‚

Best Regards,

Madhu Babu Sai

2 Comments
You must be Logged on to comment or reply to a post.