Required permissions when accessing SAP HANA directly
This section lists which permissions are required for Replicate to be able to capture changes from SAP HANA.when accessing the database directly. For the permissions required when accessing SAP HANA via SAP Application Server, see Permissions required for installing Qlik Replicate for SAP Client
When using trigger-based CDC
- Grant SELECT and TRIGGER on the SAP schema containing the selected source tables to the user specified in the SAP HANA source endpoint.
- If the
attrep_cdc_changes_ctstable is created in a schema owned by the user specified in the SAP HANA source endpoint settings (the default), no further permissions are required. - If the
_cts table is created in a schema not owned by the user specified in the endpoint settings, grant SELECT, INSERT, UPDATE and DELETE on the attrep_cdc_changes_cts table to the specified user.attrep_cdc_changes
See also: Capturing data changes
When using log-based CDC
- Grant SELECT permission on the selected source tables
- Grant the CATALOG_READ permission
- Encrypted logs - To be able to read encrypted logs, Replicate should be able to access root key backups or the Replicate user should be granted the ENCRYPTION ROOT KEY ADMIN permission.