!--a11y-->
Administration Tasks for Cryptographic
Services and Transport Layer Security 
Cryptography is used with SAP NetWeaver for certain security functions such as:
· Secure Network Communications (SNC)
· Secure Sockets Layer (SSL)
· Digital signatures and data encryption using Secure Store and Forward (SSF)
· Secure Storage
This topic provides links to the administrative tasks involved when using cryptography for these functions.
The following tools are available for using cryptographic functions:
·
ABAP:
Trust
manager
·
Java:
Keystore
service
·
Standalone servers:
SAPGENPSE (See
Configuring SNC for
Using the SAPCRPYTOLIB Using SAPGENPSE and
Configuring the SAP
Web Dispatcher to Support SSL)
To use cryptography, you must first install the cryptographic software on the server. Per default, we do provide libraries that you can download from the SAP Service Marketplace and install. For more information see:
·
ABAP:
Installing the SAP
Cryptographic Library on the SAP Web AS
·
Java:
Deploying the SAP Java
Cryptographic Toolkit
The distribution of cryptographic software is subject to and controlled by German export regulations and is not available to all customers. In addition, the library may be subject to local regulations of your own country that may further restrict the import, use and (re-)export of cryptographic software. If you have any further questions on this issue, contact your local SAP subsidiary.
The following tasks may be required when using cryptographic services:
· ABAP
¡ Generate key pairs
¡ Create certificate requests
¡ Import certificate request responses
¡ Managing Personal Security Environments (PSEs)
See
Trust Manager and
Getting
Started with the Trust Manager.
· J2EE Engine:
¡ Managing keystores, keystore views and certificates
See
Key Storage
Service.
See also:
·
Secure Network
Communications (SNC)
· SSL
¡
Using the Secure
Sockets Layer Protocol with the SAP Web AS ABAP
¡
Configuring the Use of
SSL on the SAP J2EE Engine
¡
Configuring the SAP
Web Dispatcher to Support SSL
·
Digital Signatures and
Encryption
· Secure Storage
¡
Secure Storage for
Application-Specific Data
¡
Secure Storage in the
File System