Summary

In the beginning of this chapter, we discussed the security overview of MDM 7.1. Then, we moved on to managing users and roles using the built-in system tables. We understood the concept of role-based privileges such as functional privileges, table, and fields access along with record constraints. Trusted connections and how to maintain them was discussed next. Finally, we listed other system tables that are available in MDM and understood their function.

In the next chapter, we will discuss advanced security concepts with respect to the MDM server, network security, user access, and authentication.

Get SAP NetWeaver MDM 7.1 Administrator's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.