Quantcast
Channel: SCN : All Content - SAP NetWeaver Administrator
Viewing all articles
Browse latest Browse all 5139

Whitelist for dynamic destination SM59

$
0
0

Hi All,

 

In SM59 screen, i see an red alert symbol No RFC call back check (rfc/callback_security_method undefined).

Also an entry Whitelist for dynamic destination

What are these entries? Is this required?

Can these entries(Whitelist) be removed from the the screen?

rfc/callback_security_method is dynamically switcable but not able to change the value to from RZ11. Does this needs to be declared in profile parameter first? If so what value needs to be set?

 

Kindly let me know, I read the documentation for rfc/callback_security_method. Not sure what value to be set.

 

Parameter

rfc/callback_security_method

Short text

Permit or deny execution of RFC callbacks in accordance with configured whitelist and write corresponding entry in Security Audit Log.

Parameter Description

  • Value 0: Emergency mode (fallback).
    • If callbacks have been forbidden by a previous call of the function module RFC_CALLBACK_REJECTED, the callback is rejected. Otherwise, the callback is executed.
    • All whitelist entries for RFC callbacks (including the active entires) are ignored.
  • Value 1: Default mode (compatibility mode).
    • If callbacks have been forbidden by a previous call of the function module RFC_CALLBACK_REJECTED, the callback is rejected.
    • If the callback is forbidden by an active whitelist, it is rejected.
    • In all other cases, the callback is permitted.
    • Every permitted callback is logged in the Security Audit Log with a "non-critical" (green) entry. Every rejected callback is logged with a "critical" (red) entry.
  • Value 2: Simulation Mode.
    • If callbacks have been forbidden by a previous call of the function module RFC_CALLBACK_REJECTED, the callback is rejected.
    • If the callback is forbidden by an active whitelist, it is rejected.
    • In all other cases, the callback is permitted.
    • Every rejected callback is logged with a "critical" (red) entry in the Security Audit Log. Every permitted callback, which would have been rejected if the whitelist had been activated, is also logged with a "critical" (red) entry in the Security Audit Log. All other permitted callbacks are logged with a "non-critical" (green) entry.
  • Value 3: Most Secure Mode:
    • If callbacks have been forbidden by a previous call of the function module RFC_CALLBACK_REJECTED, the callback is rejected.
    • If the callback is forbidden by an active or inactive whitelist, it is rejected. (Note that, in this mode, an inactive whitelist has the same effect as an active whitelist.)
    • In all other cases, the callback is permitted.
    • Every rejected callback is logged with a "critical" (red) entry in the Security Audit Log. Every permitted callback is logged with a "non-critical" (green) entry.

 


Regards

Shashi


Viewing all articles
Browse latest Browse all 5139

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>