Security
1343
Blog Posts
570 Contributors
-
... Read More »0Comments0Likes -
Guys, so we face this every day, we need to mass update something. I am not sure about you, but working on projects and all, I face this thing every day to update multiple users, or perform mass updating the roles. There are 3 solutions to this viz.... Read More »1Comment1Like -
In different sectors, we are all witnessing a significant increase in the use and deployment of chatbots. Many are attempting to come up with ideas that will help to create a better experience for users. As per Gartner, “Artificial Intelligence... Read More »0Comments2Likes -
In this very simple tutorial we’re going to learn how to create a REST service based on Node.js and run it in Kyma. We’re also going to secure an endpoint with OAuth protection provided by Kyma Warning: There won’t be a happy end! We’ll... Read More »5Comments4Likes -
This document supplies answers to frequently asked questions about SAP Code Vulnerability Analyzer (CVA). Introduction SAP Code Vulnerability Analyzer (CVA) is based on the infrastructure of ABAP Test Cockpit (ATC). ATC provides a general check... Read More »10Comments3Likes -
以前、SAPのセキュリティを考える際のリファレンスモデルであるSecure Operation Mapについてご紹介いたしました(Secure Operation Mapのご紹介)が、本記事ではSecure Operation... Read More »0Comments1Like -
Introduction In every Project you have worked or will work you will get this Error Message. “You are not Authorized to use this Transaction Code” General procedure after that if you have worked with SAP before, you will take a SU53... Read More »8Comments16Likes -
In case you missed it, Splunk and SAP’s partnership first announced last year has quickly developed into two very exciting areas. One around enterprise security, with Splunk’s Alert Action for SAP Enterprise Threat Detection. This Splunkbase... Read More »0Comments1Like -
For applications based on SAP Cloud Platform to participate in integration scenarios of the Intelligent Enterprise, the aspect of multitenancy must be decoupled from the aspect of subaccounts. Both aspects can have different IDs. The subaccount ID... Read More »0Comments3Likes -
End-to-End Tutorial | Developing Secure Applications on the SAP Cloud Platform Cloud Foundry RuntimeThis blog post series is about developing applications in a multi-cloud environment. End-to-End Tutorial | Developing Secure Applications on the SAP Cloud Platform Cloud Foundry Runtime <<< this post For the blog post about the SAP... Read More »0Comments6Likes