40. Thank you
Contact information
Andrea Kristen
SAP HANA Product Management
AskSAPHANA@sap.com
To get the best overview of what’s new in SAP HANA SPS 07, read this blog.
XS Administration Tool: Web-based tool that enables you to configure and maintain the basic administration-related elements of the application-development process and environment
User mapping is not supported.
In SPS 6, this functionality was only available as an SQL command.
The design-time objects that are stored in the SAP HANA database repository can be transported to other SAP HANA database repository installations and delivered to customers. The transport granularity is the delivery unit (DU). Every repository object belongs to a package. A package can contain an arbitrary number of objects of different types. A package can be assigned to a DU.
Use case: development of SAP HANA applications, e.g. if something works for everyone else, but not in your sessionExample: Developer Bob wants to authorize developer Alice to debug a procedure in Bob’s session
SAP HANA smart data access can be used, for example, in SAP Business Warehouse installations running on SAP HANA to integrate data from remote sources. Note: There are also system privileges required for Smart Data access, but they have been available in SAP HANA studio in SAP HANA SPS 6 already and are therefore not listed here.
Data volume encryption was introduced with SPS 5, but could only be configured using SQL until now. Data volume encryption uses the AEC-256-CBC algorithm. During database start-up, administrator interaction is not required. The data volume root key is stored using the SAP NetWeaver secure storage in the file system (SSFS) functionality and is automatically retrieved from there.
For access to the SAP HANA database via XS, SSL encryption could already be enforced for client connections in SPS 6For internal communication between nodes in a scale-out instance, communication automatically uses SSL if this has been configured
System replication is a mechanism for ensuring the high availability of SAP HANA systems. Through the continuous replication of data from a primary to a secondary system, including in-memory loading, system replication facilitates rapid failover in the event of a disaster. Productive operations can be resumed with minimal downtime.For more information (e.g. for scenarios involving more than two systems), see the SAP HANA Security Guide
Auditing allows you to monitor and record selected actions performed in your system. In other words, it provides you with visibility on who did what (or tried to do what) and when. The following actions are typically audited:Changes to user authorizationCreation or deletion of database objectsAuthentication of usersChanges to system configurationAccess to or changing of sensitive information
Note:For test purposes in non-production systems, you can also use a CSV text file as the audit trail. A separate CSV file is created for every service that executes SQL
Note: Users must exist before they can be specified in an audit policy