{"id":65452,"date":"2020-04-09T08:00:50","date_gmt":"2020-04-09T06:00:50","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=65452"},"modified":"2020-03-30T10:58:57","modified_gmt":"2020-03-30T08:58:57","slug":"secure-development-with-sap-hana-xsa","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/es\/secure-development-with-sap-hana-xsa\/","title":{"rendered":"Desarrollo seguro con SAP Hana XSA"},"content":{"rendered":"<p>Con Hana 1.0 SPS11, se introdujo SAP Hana Extended Application Services, Advanced Model (SAP Hana XSA). Este modelo se basa en el enfoque de microservicios y permite una modularizaci\u00f3n del desarrollo de software. Esto permite diferentes despliegues (entornos de desarrollo separados) dentro de una \u00fanica base de datos Hana.<\/p>\r\n\r\n\r\n\r\n<p>Cada aplicaci\u00f3n se almacena en su propio contenedor y tiene su propio entorno de ejecuci\u00f3n. Esto significa que cualquier problema con la aplicaci\u00f3n no afecta a otras aplicaciones.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-3516891460\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-975375731\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-1099426019\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\r\n\r\n\r\n\r\n<p>Al utilizar SAP Hana XSA, deben observarse diversos criterios de seguridad para que el desarrollo de la aplicaci\u00f3n pueda autorizarse de acuerdo con los requisitos.<\/p>\r\n\r\n\r\n\r\n<p>La soluci\u00f3n se gestiona con SAP Hana XSA Cockpit. Aqu\u00ed se gestionan los usuarios y las autorizaciones, as\u00ed como la configuraci\u00f3n de seguridad. Esta \u00faltima incluye, por ejemplo, los inquilinos, que pueden gestionarse desde aqu\u00ed, y la gesti\u00f3n de los proveedores de identidad SAML.<\/p>\r\n\r\n\r\n\r\n<p>En la administraci\u00f3n de usuarios se pueden crear nuevos usuarios o migrar usuarios Hana existentes a usuarios XSA. Las autorizaciones para ello se asignan a trav\u00e9s de las denominadas colecciones de roles. Por ejemplo, la colecci\u00f3n de funciones XS User Admin es necesaria para la administraci\u00f3n de usuarios, y la colecci\u00f3n de funciones XS Authorisation Admin es necesaria para la administraci\u00f3n de funciones.<\/p>\r\n\r\n\r\n\r\n<p>Para la visualizaci\u00f3n pura est\u00e1n disponibles las colecciones de roles est\u00e1ndar XS Authorisation Display y XS User Display. La trazabilidad de la administraci\u00f3n de usuarios y autorizaciones es posible mediante la auditor\u00eda de la base de datos de Hana; aqu\u00ed deben activarse las acciones de auditor\u00eda correspondientes.<\/p>\r\n\r\n\r\n\r\n<p>La estructura b\u00e1sica de SAP Hana XSA consiste en organizaciones y espacios. Las aplicaciones se desarrollan dentro de los Espacios. Las organizaciones son contenedores para estructurar los espacios. Los desarrolladores se asignan a los Spaces.<\/p>\r\n\r\n\r\n\r\n<p>Deben haber sido creados previamente como registro maestro de usuario. Al asignar los usuarios a los Espacios, se les asignan las autorizaciones. Se distingue entre Gestor de Espacio (mantenimiento de la asignaci\u00f3n de usuarios al Espacio y visualizaci\u00f3n y evaluaci\u00f3n de las aplicaciones), Desarrollador de Espacio (integraci\u00f3n, inicio y parada de aplicaciones, asignaci\u00f3n de aplicaciones a servicios) y Auditor de Espacio (visualizaci\u00f3n y evaluaci\u00f3n de las aplicaciones y de las asignaciones de usuarios al Espacio).<\/p>\r\n\r\n\r\n\r\n<p>Esto define qu\u00e9 usuarios est\u00e1n activos como desarrolladores dentro del Espacio. A nivel de organizaci\u00f3n, la autorizaci\u00f3n de Gestor de organizaci\u00f3n puede utilizarse para autorizar el mantenimiento de la asignaci\u00f3n de usuarios a la organizaci\u00f3n y el mantenimiento de los Espacios en la organizaci\u00f3n.<\/p>\r\n\r\n\r\n\r\n<p>Los cambios en las organizaciones y los espacios se registran en un archivo de seguimiento en el sistema operativo. Pueden evaluarse con Hana Database Explorer, por ejemplo.<\/p>\r\n\r\n\r\n\r\n<p>La plataforma de desarrollo central para las aplicaciones SAPUI5 es SAP WebIDE (Entorno de Desarrollo Integrado). Se admiten varios lenguajes, como Java, Java Script, SAPUI5 HTML5, Node.js, etc. WebIDE puede utilizarse tanto para aplicaciones locales (Hana XSA) como para una aplicaci\u00f3n de desarrollo central para SAP Cloud Platform (Cloud Foundry).<\/p>\r\n\r\n\r\n\r\n<p>Para utilizar la WebIDE, los desarrolladores deben tener asignadas autorizaciones en SAP Hana XSA. Para ello ya existen dos roles de plantilla, WebIDE Developer y WebIDE Administrator. Para autorizar a los usuarios a desarrollar aplicaciones, debe derivarse un rol de la plantilla WebIDE Developer.<\/p>\r\n\r\n\r\n\r\n<p>Deben definirse especificaciones internas de la empresa para la implementaci\u00f3n de autorizaciones en desarrollos propios. Tambi\u00e9n se pueden integrar acciones en los desarrollos propios, que se registran a trav\u00e9s de Hana Auditing.<\/p>\r\n\r\n\r\n\r\n<p>Para ello, en la auditor\u00eda existe la categor\u00eda Auditor\u00eda de aplicaciones, en la que, entre otras cosas, se pueden registrar acciones como Acceso a datos personales y Modificaci\u00f3n de datos personales. Para el uso de SAP Hana XSA debe crearse un concepto de seguridad y autorizaci\u00f3n independiente, que tambi\u00e9n se revisa peri\u00f3dicamente.<\/p>","protected":false},"excerpt":{"rendered":"<p>Con SAP Hana XSA son posibles diferentes implementaciones dentro de una \u00fanica base de datos Hana. Deben observarse diversos criterios de seguridad para que el desarrollo de aplicaciones pueda autorizarse seg\u00fan los requisitos.<\/p>","protected":false},"author":148,"featured_media":15608,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[7,21,37393],"tags":[65,5177],"coauthors":[22429],"class_list":["post-65452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-2003","tag-hana","tag-sapui5"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Mit SAP Hana XSA sind unterschiedliche Deployments innerhalb einer einzigen Hana-Datenbank m\u00f6glich. Verschiedene Sicherheitskriterien sind zu beachten, damit die Anwendungsentwicklung anforderungsgerecht berechtigt werden kann.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/seguridad-informatica\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/mag-2003\/\" rel=\"category tag\">MAG 20-03<\/a>","author_info_v2":{"name":"Thomas Tiede, IBS","url":"https:\/\/e3magpmp.greatsolution.dev\/es\/author\/thomas-tiede\/"},"comments_num_v2":"0 comentarios","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/65452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/users\/148"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/comments?post=65452"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/65452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media?parent=65452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/categories?post=65452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/tags?post=65452"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/coauthors?post=65452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}