Your network infrastructure is extremely important in protecting your system. Your network needs to support the communication necessary for your business needs without allowing unauthorized access. A well-defined network topology can eliminate many security threats based on software flaws (at both the operating system and application level) or network attacks such as eavesdropping. If users cannot log on to your application or database servers at the operating system or database layer, there is no way for intruders to compromise the machines and gain access to the backend system's database or files. Additionally, if users are not able to connect to the server LAN (local area network), they cannot exploit well-known bugs and security holes in network services on the server machines.
To guarantee network security for SAP Cloud Appliance Library, verify the usage of the protocols for communication, in accordance with the following requirements:
|To provide authentication, integrity, and privacy protection, using the communication between the client and SAP Cloud Appliance Library.||HTTPS||SSL|
|To provide authentication, integrity, and privacy protection, using the communication between the client computer and the operating system (OS) of the instance on which the SAP solution is running.||SSH||Private-key cryptography|