Start Level 1 Node: SAP Process Integration Security GuideSAP Process Integration Security GuideEnd Level 1 Node: SAP Process Integration Security Guide
   Start Level 1 Node: Before You StartBefore You StartEnd Level 1 Node: Before You Start
   Start Level 1 Node: SAP PI Security Guide (Dual Usage Type)SAP PI Security Guide (Dual Usage Type)End Level 1 Node: SAP PI Security Guide (Dual Usage Type)
      Start Level 2 Node: Technical System LandscapeTechnical System LandscapeEnd Level 2 Node: Technical System Landscape
      Start Level 2 Node: CommunicationCommunicationEnd Level 2 Node: Communication
         Start Level 3 Node: Technical CommunicationTechnical CommunicationEnd Level 3 Node: Technical Communication
         Start Level 3 Node: Business CommunicationBusiness CommunicationEnd Level 3 Node: Business Communication
         Start Level 3 Node: Communication DestinationsCommunication DestinationsEnd Level 3 Node: Communication Destinations
            Start Level 4 Node: Destinations for Technical CommunicationDestinations for Technical CommunicationEnd Level 4 Node: Destinations for Technical Communication
            Start Level 4 Node: Destinations for Business CommunicationDestinations for Business CommunicationEnd Level 4 Node: Destinations for Business Communication
            Start Level 4 Node: Destinations for Monitoring and AlertingDestinations for Monitoring and AlertingEnd Level 4 Node: Destinations for Monitoring and Alerting
            Start Level 4 Node: Destinations for Cross-Component BPMDestinations for Cross-Component BPMEnd Level 4 Node: Destinations for Cross-Component BPM
         Start Level 3 Node: Message-Level SecurityMessage-Level SecurityEnd Level 3 Node: Message-Level Security
            Start Level 4 Node: Certificate StoreCertificate StoreEnd Level 4 Node: Certificate Store
            Start Level 4 Node: Archiving Secured MessagesArchiving Secured MessagesEnd Level 4 Node: Archiving Secured Messages
         Start Level 3 Node: Network and Transport Layer SecurityNetwork and Transport Layer SecurityEnd Level 3 Node: Network and Transport Layer Security
            Start Level 4 Node: HTTP and SSLHTTP and SSLEnd Level 4 Node: HTTP and SSL
            Start Level 4 Node: RFC and SNCRFC and SNCEnd Level 4 Node: RFC and SNC
            Start Level 4 Node: FTP and FTPSFTP and FTPSEnd Level 4 Node: FTP and FTPS
            Start Level 4 Node: Communication PortsCommunication PortsEnd Level 4 Node: Communication Ports
            Start Level 4 Node: Network ZonesNetwork ZonesEnd Level 4 Node: Network Zones
            Start Level 4 Node: SSL Administration in a Dual Usage Type InstallationSSL Administration in a Dual Usage Type InstallationEnd Level 4 Node: SSL Administration in a Dual Usage Type Installation
         Start Level 3 Node: Adapter-Specific Security SettingsAdapter-Specific Security SettingsEnd Level 3 Node: Adapter-Specific Security Settings
            Start Level 4 Node: Adapters Running on the Integration EngineAdapters Running on the Integration EngineEnd Level 4 Node: Adapters Running on the Integration Engine
            Start Level 4 Node: Adapters Running on the Advanced Adapter EngineAdapters Running on the Advanced Adapter EngineEnd Level 4 Node: Adapters Running on the Advanced Adapter Engine
               Start Level 5 Node: IDoc Adapter (AAE)IDoc Adapter (AAE)End Level 5 Node: IDoc Adapter (AAE)
               Start Level 5 Node: RFC AdapterRFC AdapterEnd Level 5 Node: RFC Adapter
               Start Level 5 Node: SOAP AdapterSOAP AdapterEnd Level 5 Node: SOAP Adapter
               Start Level 5 Node: SAP Business Connector AdapterSAP Business Connector AdapterEnd Level 5 Node: SAP Business Connector Adapter
               Start Level 5 Node: Marketplace AdapterMarketplace AdapterEnd Level 5 Node: Marketplace Adapter
               Start Level 5 Node: RosettaNet RNIF AdaptersRosettaNet RNIF AdaptersEnd Level 5 Node: RosettaNet RNIF Adapters
               Start Level 5 Node: CIDX AdapterCIDX AdapterEnd Level 5 Node: CIDX Adapter
               Start Level 5 Node: File/FTP, JDBC, JMS, and Mail AdaptersFile/FTP, JDBC, JMS, and Mail AdaptersEnd Level 5 Node: File/FTP, JDBC, JMS, and Mail Adapters
               Start Level 5 Node: HTTP Adapter (AAE)HTTP Adapter (AAE)End Level 5 Node: HTTP Adapter (AAE)
            Start Level 4 Node: Adapters Running on the Adapter Engine (Java SE)Adapters Running on the Adapter Engine (Java SE)End Level 4 Node: Adapters Running on the Adapter Engine (Java SE)
         Start Level 3 Node: Security Concepts for B2B CommunicationSecurity Concepts for B2B CommunicationEnd Level 3 Node: Security Concepts for B2B Communication
      Start Level 2 Node: User Management and Authorization Concepts (Dual Usage Type)User Management and Authorization Concepts (Dual Usage Type)End Level 2 Node: User Management and Authorization Concepts (Dual Usage Type)
         Start Level 3 Node: User Management for Non-Central AAE (PI-AF)User Management for Non-Central AAE (PI-AF)End Level 3 Node: User Management for Non-Central AAE (PI-AF)
         Start Level 3 Node: Standard Users (Dual Usage Type)Standard Users (Dual Usage Type)End Level 3 Node: Standard Users (Dual Usage Type)
            Start Level 4 Node: User StoreUser StoreEnd Level 4 Node: User Store
            Start Level 4 Node: Changing Service UsersChanging Service UsersEnd Level 4 Node: Changing Service Users
            Start Level 4 Node: Service Users for Internal CommunicationService Users for Internal CommunicationEnd Level 4 Node: Service Users for Internal Communication
            Start Level 4 Node: Service Users for Message ExchangeService Users for Message ExchangeEnd Level 4 Node: Service Users for Message Exchange
         Start Level 3 Node: User TypesUser TypesEnd Level 3 Node: User Types
         Start Level 3 Node: Roles (AS ABAP)Roles (AS ABAP)End Level 3 Node: Roles (AS ABAP)
            Start Level 4 Node: Integration into Single Sign-On EnvironmentsIntegration into Single Sign-On EnvironmentsEnd Level 4 Node: Integration into Single Sign-On Environments
            Start Level 4 Node: Roles for Cross-Component Business Process ManagementRoles for Cross-Component Business Process ManagementEnd Level 4 Node: Roles for Cross-Component Business Process Management
         Start Level 3 Node: UME Roles and Actions (AS Java)UME Roles and Actions (AS Java)End Level 3 Node: UME Roles and Actions (AS Java)
            Start Level 4 Node: UME ActionsUME ActionsEnd Level 4 Node: UME Actions
            Start Level 4 Node: Roles for Secure Usage of the Integration Directory Programming InterfaceRoles for Secure Usage of the Integration Directory Programming InterfaceEnd Level 4 Node: Roles for Secure Usage of the Integration Directory Programming Interface
         Start Level 3 Node: Role-Based Authorizations in ES Repository and Integration DirectoryRole-Based Authorizations in ES Repository and Integration DirectoryEnd Level 3 Node: Role-Based Authorizations in ES Repository and Integration Directory
         Start Level 3 Node: ACL-Based AuthorizationsACL-Based AuthorizationsEnd Level 3 Node: ACL-Based Authorizations
            Start Level 4 Node: ACL-Based Authorizations in ES Repository and Integration DirectoryACL-Based Authorizations in ES Repository and Integration DirectoryEnd Level 4 Node: ACL-Based Authorizations in ES Repository and Integration Directory
            Start Level 4 Node: ACL-Based Authorizations for Service UsersACL-Based Authorizations for Service UsersEnd Level 4 Node: ACL-Based Authorizations for Service Users
      Start Level 2 Node: Data Storage SecurityData Storage SecurityEnd Level 2 Node: Data Storage Security
         Start Level 3 Node: Data Storage Security for the Enterprise Services RepositoryData Storage Security for the Enterprise Services RepositoryEnd Level 3 Node: Data Storage Security for the Enterprise Services Repository
         Start Level 3 Node: Data Storage Security for the Integration DirectoryData Storage Security for the Integration DirectoryEnd Level 3 Node: Data Storage Security for the Integration Directory
         Start Level 3 Node: Data Storage Security for the Advanced Adapter EngineData Storage Security for the Advanced Adapter EngineEnd Level 3 Node: Data Storage Security for the Advanced Adapter Engine
         Start Level 3 Node: Data Storage Security for the Integration EngineData Storage Security for the Integration EngineEnd Level 3 Node: Data Storage Security for the Integration Engine
      Start Level 2 Node: Further Security-Related TopicsFurther Security-Related TopicsEnd Level 2 Node: Further Security-Related Topics
         Start Level 3 Node: Cross-Site Request Forgery ProtectionCross-Site Request Forgery ProtectionEnd Level 3 Node: Cross-Site Request Forgery Protection
         Start Level 3 Node: Excluding Web Pages From Being Indexed by Web CrawlersExcluding Web Pages From Being Indexed by Web CrawlersEnd Level 3 Node: Excluding Web Pages From Being Indexed by Web Crawlers
         Start Level 3 Node: Protection of Sensitive Message DataProtection of Sensitive Message DataEnd Level 3 Node: Protection of Sensitive Message Data
            Start Level 4 Node: Potential Visibility of Sensitive Message DataPotential Visibility of Sensitive Message DataEnd Level 4 Node: Potential Visibility of Sensitive Message Data
            Start Level 4 Node: Messaging Components of the Integration EngineMessaging Components of the Integration EngineEnd Level 4 Node: Messaging Components of the Integration Engine
            Start Level 4 Node: Java-Based Messaging ComponentsJava-Based Messaging ComponentsEnd Level 4 Node: Java-Based Messaging Components
         Start Level 3 Node: Using SAP PI in PCI-Compliant ScenariosUsing SAP PI in PCI-Compliant ScenariosEnd Level 3 Node: Using SAP PI in PCI-Compliant Scenarios
         Start Level 3 Node: AuditingAuditingEnd Level 3 Node: Auditing
         Start Level 3 Node: Links to Additional PI Administrative ToolsLinks to Additional PI Administrative ToolsEnd Level 3 Node: Links to Additional PI Administrative Tools
   Start Level 1 Node: SAP PI Security Guide (AEX)SAP PI Security Guide (AEX)End Level 1 Node: SAP PI Security Guide (AEX)
      Start Level 2 Node: Technical System LandscapeTechnical System LandscapeEnd Level 2 Node: Technical System Landscape
      Start Level 2 Node: CommunicationCommunicationEnd Level 2 Node: Communication
         Start Level 3 Node: Technical CommunicationTechnical CommunicationEnd Level 3 Node: Technical Communication
         Start Level 3 Node: Business CommunicationBusiness CommunicationEnd Level 3 Node: Business Communication
         Start Level 3 Node: Communication DestinationsCommunication DestinationsEnd Level 3 Node: Communication Destinations
            Start Level 4 Node: Destinations for Technical CommunicationDestinations for Technical CommunicationEnd Level 4 Node: Destinations for Technical Communication
            Start Level 4 Node: Destinations for Business CommunicationDestinations for Business CommunicationEnd Level 4 Node: Destinations for Business Communication
            Start Level 4 Node: Destinations for Monitoring and AlertingDestinations for Monitoring and AlertingEnd Level 4 Node: Destinations for Monitoring and Alerting
         Start Level 3 Node: Message-Level SecurityMessage-Level SecurityEnd Level 3 Node: Message-Level Security
            Start Level 4 Node: Archiving Secured MessagesArchiving Secured MessagesEnd Level 4 Node: Archiving Secured Messages
         Start Level 3 Node: Network and Transport Layer SecurityNetwork and Transport Layer SecurityEnd Level 3 Node: Network and Transport Layer Security
            Start Level 4 Node: HTTP and SSLHTTP and SSLEnd Level 4 Node: HTTP and SSL
            Start Level 4 Node: Communication PortsCommunication PortsEnd Level 4 Node: Communication Ports
         Start Level 3 Node: Adapter-Specific Security SettingsAdapter-Specific Security SettingsEnd Level 3 Node: Adapter-Specific Security Settings
         Start Level 3 Node: Security Concepts for B2B CommunicationSecurity Concepts for B2B CommunicationEnd Level 3 Node: Security Concepts for B2B Communication
      Start Level 2 Node: User Management and Authorization Concepts (AEX)User Management and Authorization Concepts (AEX)End Level 2 Node: User Management and Authorization Concepts (AEX)
         Start Level 3 Node: Standard Users (AEX)Standard Users (AEX)End Level 3 Node: Standard Users (AEX)
            Start Level 4 Node: Service Users for Internal CommunicationService Users for Internal CommunicationEnd Level 4 Node: Service Users for Internal Communication
      Start Level 2 Node: Data Storage SecurityData Storage SecurityEnd Level 2 Node: Data Storage Security
      Start Level 2 Node: Further Security-Related TopicsFurther Security-Related TopicsEnd Level 2 Node: Further Security-Related Topics
         Start Level 3 Node: Security Aspects of the SAP Process Integration Tools (in Eclipse)Security Aspects of the SAP Process Integration Tools (in Eclipse)End Level 3 Node: Security Aspects of the SAP Process Integration Tools (in Eclipse)
         Start Level 3 Node: Protection of Sensitive Message DataProtection of Sensitive Message DataEnd Level 3 Node: Protection of Sensitive Message Data
         Start Level 3 Node: AuditingAuditingEnd Level 3 Node: Auditing