Skip to main content Skip to complementary content

Required permissions when accessing SAP HANA directly

This section lists which permissions are required for Replicate to be able to capture changes from SAP HANA.when accessing the database directly. For the permissions required when accessing SAP HANA via SAP Application Server, see Permissions required for installing Qlik Replicate for SAP Client

When using trigger-based CDC

  • Grant SELECT and TRIGGER on the SAP schema containing the selected source tables to the user specified in the SAP HANA source endpoint.
  • If the attrep_cdc_changes_cts table is created in a schema owned by the user specified in the SAP HANA source endpoint settings (the default), no further permissions are required.
  • If the attrep_cdc_changes_cts table is created in a schema not owned by the user specified in the endpoint settings, grant SELECT, INSERT, UPDATE and DELETE on the attrep_cdc_changes_cts table to the specified user.

See also: Capturing data changes

When using log-based CDC

  • Grant SELECT permission on the selected source tables
  • Grant the CATALOG_READ permission
  • Encrypted logs - To be able to read encrypted logs, Replicate should be able to access root key backups or the Replicate user should be granted the ENCRYPTION ROOT KEY ADMIN permission.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – please let us know!