Configuring Security in SAP Mobile Platform

To administer security across SAP Mobile Platform, you need to create and configure security profiles, assign authentication providers to the security profiles, map SAP Mobile Platform logical roles to your physical roles, manage the keystores and truststore, ensure strong JVM encryption, and configure virus protection for the landscape. Then you should monitor and validate your security configuration to ensure system health.


Review Planning your Security Landscape before proceeding with configuring SAP Mobile Platform security.