on ‎2020 Jun 09 11:03 AM
We are on GRCFND_A-SP08, GRCPINW- 1200_750_SP8 version and trying to implement EAM on HANA DB. What I noticed is that while using the EAM process on HANA DB I am able to share the Firefighter password (I am not logging using password copied from clipboard) with user A and user A is able to login to HANA Studio or another WEBIDE session using the FF password which I shared.
Is there any way to mitigate it?
Request clarification before answering.
Did somone configure the HANA Disable Password (SAML) attribute?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Akash,
You can set password expiry using parameter "HANA Firefighter Timeout" attribute (in seconds) to mitigate the risk of HANA DB Firefighter being misused.
Navigate to Governance, Risk and Compliance -> Access Control -> Maintain Connector Settings. Select the HANA connector where you would like to set timeout then Click Assign Attributes to the Connector. Click on New Entries, select HANA Firefighter Timeout as Attribute Name and then type the desired timeout in seconds.

Regards,
Madhu
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| User | Count |
|---|---|
| 40 | |
| 9 | |
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.