Analyzing Code with CAST RPA SCAN. IDENTIFY. ACT..

Slides:



Advertisements
Similar presentations
Web Designing Using Microsoft FrontPages Kashif Haqqi, M.D.
Advertisements

Introduction to the ABAP Data Dictionary
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Using Visual Basic 6.0 to Create Web-Based Database Applications
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
JOIN A COMMUNITY OF 80,000 E-COMMERCE SITES WORLDWIDE.
Software Documentation Written By: Ian Sommerville Presentation By: Stephen Lopez-Couto.
Online Report Designer (ORD)
Standard 1 - Objective 2: Understand, evaluate, and use computer software.
13 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Downloading from the Internet The graphical user interface has made it so.
USER GUIDE TO OPEN OFFICE BY MARTIN ROCHE 11K. CONTENTS.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
TC2-Computer Literacy Mr. Sencer February 8, 2010.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Introduction to Interactive Media Interactive Media Tools: Software.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
Configuration Management (CM)
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
The Basics of Javadoc Presented By: Wes Toland. Outline  Overview  Background  Environment  Features Javadoc Comment Format Javadoc Program HTML API.
CHAPTER TEN AUTHORING.
Introduction to the Visual Studio.NET IDE (LAB 1 )
Just as there are many human languages, there are many computer programming languages that can be used to develop software. Some are named after people,
Computer Emergency Notification System (CENS)
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Lecture Note 1: Getting Started With ASP.  Introduction to ASP  Introduction to ASP An ASP file can contain text, HTML tags and scripts. Scripts in.
Introduction to the Adapter Server Rob Mace June, 2008.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Packaging for Voracity Solutions Control Panel David Turner.
Part 4 Processing and saving data with CGI/Perl Psychological Science on the Internet: Designing Web-Based Experiments From the Ground Up R. Chris Fraley.
] COREY PEARSON [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2008 CHAVONE JACOBS [ ASUG INSTALLATION MEMBER MEMBER SINCE: 2003 ALLAN FISHER [ ASUG INSTALLATION.
1 Title: Introduction to Computer Instructor: I LTAF M EHDI.
1 Delta Confidential 1 Extranet FTP Portal DET - IT Department March 30, 2006.
NanoSearch DMS V2.3 Make our daily job became easy With Documents Management System.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
C.B.T. Administrator course
Hyperion Artifact Life Cycle Management Agenda  Overview  Demo  Tips & Tricks  Takeaways  Queries.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
SPS Spotlight Series October 2014
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
Data Virtualization Demoette… Logging in CIS
Development Environment
Getting Started with... Business Partner Express
Welcome © GTM Software. Welcome © GTM Software.
WikID installation/training
(Application Form - Part VI)
Project Model-Based Systems Engineering: Documentation and Analysis
Using iLocker.
The Orientation Toolkit for CARE Offices
Data Virtualization Demoette… CIS Rights
Software Documentation
Once you are finished, DELETE THIS SLIDE and save your presentation.
Microsoft Office Illustrated
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
Once you are finished, DELETE THIS SLIDE and save your presentation.
Principles of report writing
Title: Unified Communication Application Suite Keycode Retrieval System (KRS) User Guide Issue: 0.2 Date: July 2011 Hi and welcome to the.
Hi and welcome to the Order Centre – Ordering training.
Title: Agile Communication Environment Keycode Retrieval System (KRS) User Guide Issue: 0.4 Date: July 2011 Hi and welcome to the Order.
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Once you are finished, DELETE THIS SLIDE and save your presentation.
Introduction to Web Application Design
Presentation transcript:

Analyzing Code with CAST RPA SCAN. IDENTIFY. ACT.

2 Confidential This document outlines the basic process to analyze source code with the CAST Highlight Analyzer. Before you get started be sure that you have the CAST Highlight Analyzer installed on your desktop. If you do not you can click here to download it.here About the CAST Highlight Analyzer The Analyzer contains the code quality analyzers and other utilities needed to analyze your source code. The analyzer is a downloadable so that you can perform the analysis in your domain, where your code resides. Once complete the Analyzer creates an encrypted file that you will need to upload to this portal. This file contain only the application name and data needed to finalize the analysis. Introduction CAST HIGHLIGHT ANALYZER Please note that no source code or other information is ever uploaded to the portal.

3 Confidential Process overview As application are composed of different technologies CAST Highlight can analyze many languages (the following page contains a complete listing). As Highlight does not connect to databases or software configuration systems the code to be scanned must be extracted first. The following pages provide instructions on how to prepare the code for analysis. Before you get started please be sure to identify all the application components and ensure that you have access to them.

4 Confidential The application source code must be available as in text files that are accessible to the Highlight Analyzer. For security reasons, the Analyzer cannot access source code management systems therefore you will need to extract the source code from any CMDB to a location that can be accessed by the Analyzer. Extracted File Formats: The table to the right lists which file extensions per technology can be analyzed. For languages not requiring a specific source file extension (COBOL, Unix shell scripts and PL1), it is recommended to designate a folder with only source files to be analyzed.. Analyzing Code

5 Confidential To analyze database code you need to extract information from your database. CAST provides tools to extract the table/program data into a format that can be read analyzed. The extraction can be carried out either: using the executable.JAR files CASTDBGUI.jar / CASTDBExtractorGUI.jar or using the command line only (CASTDBExtractor.jar) Code must be extract one script file per functions, procedures, triggers, views. Analyzing Databases

6 Confidential The following information is needed prior to performing the SAP / ABAP extraction:  CAST supports SAP R3 (4.0 to 6.0)  The name of customized objects must start with a Z - although SAP does allow certified partners that deliver SAP complements to use other letters for the transactions (example: Y*, LZ*, LY*, SAPLY*, SAPLZ*)  Are there SAP packages outside of the Z package that are to be analyzed?  Are applications implemented on several SAP instances?  Can you quantify the number of ABAP objects per package this represent?  SAP access must be set up for a SAP user that has development authority  Which network or local hard drive can be used to store the results of the extraction?  If you have not installed the CAST ABAP Extractors please refer to the following page. Analyze SAP ABAP Custom Code

7 Confidential Install CAST ABAP extractors (ZCAST_EXTRACTOR_prog.abap and ZCAST_EXTRACTOR_tables.abap) which are located in the C drive C:\Program Files (x86)\CAST\Highlight\IHM\content The ZCAST_EXTRACTOR_PRG*.txt extracts all programs belonging to SAP packages including, user-exits, functions, classes, interfaces, BAPI, processing screens, transactions, Web Dynpro for ABAP. The ZCAST_EXTRACTOR_TAB*.txt extracts all tables and views belonging to SAP object names as well as extract the number of rows for tables that have been extracted. The extraction process splits the code into different folders (1 folder = 1 package). Highlight can read each folder and analyze each program (.abap) associated to the folder. ABAP Extractors FOR INSTRUCTIONS REVIEW THE SAP EXTRACTOR GUIDE.