Start Level 1 Node: SAP NetWeaver Process Integration Security GuideSAP NetWeaver Process Integration Security GuideEnd Level 1 Node: SAP NetWeaver Process Integration Security Guide
   Start Level 2 Node: Technical System LandscapeTechnical System LandscapeEnd Level 2 Node: Technical System Landscape
      Start Level 3 Node: CommunicationCommunicationEnd Level 3 Node: Communication
         Start Level 4 Node: Technical CommunicationTechnical CommunicationEnd Level 4 Node: Technical Communication
         Start Level 4 Node: Business CommunicationBusiness CommunicationEnd Level 4 Node: Business Communication
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
   Start Level 2 Node: User Administration and AuthenticationUser Administration and AuthenticationEnd Level 2 Node: User Administration and Authentication
      Start Level 3 Node: User StoreUser StoreEnd Level 3 Node: User Store
      Start Level 3 Node: User TypesUser TypesEnd Level 3 Node: User Types
         Start Level 4 Node: Dialog UsersDialog UsersEnd Level 4 Node: Dialog Users
            Start Level 5 Node: Integration into Single Sign-On EnvironmentsIntegration into Single Sign-On EnvironmentsEnd Level 5 Node: Integration into Single Sign-On Environments
         Start Level 4 Node: Service Users for Internal CommunicationService Users for Internal CommunicationEnd Level 4 Node: Service Users for Internal Communication
         Start Level 4 Node: Service Users for Message ExchangeService Users for Message ExchangeEnd Level 4 Node: Service Users for Message Exchange
         Start Level 4 Node: Changing Service UsersChanging Service UsersEnd Level 4 Node: Changing Service Users
   Start Level 2 Node: AuditingAuditingEnd Level 2 Node: Auditing
   Start Level 2 Node: Message-Level SecurityMessage-Level SecurityEnd Level 2 Node: Message-Level Security
      Start Level 3 Node: Certificate StoreCertificate StoreEnd Level 3 Node: Certificate Store
      Start Level 3 Node: Archiving Secured MessagesArchiving Secured MessagesEnd Level 3 Node: Archiving Secured Messages
   Start Level 2 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 2 Node: Network and Communication Security
      Start Level 3 Node: HTTP and SSLHTTP and SSLEnd Level 3 Node: HTTP and SSL
      Start Level 3 Node: RFC and SNCRFC and SNCEnd Level 3 Node: RFC and SNC
      Start Level 3 Node: FTP and FTPSFTP and FTPSEnd Level 3 Node: FTP and FTPS
      Start Level 3 Node: Communication PortsCommunication PortsEnd Level 3 Node: Communication Ports
      Start Level 3 Node: Network ZonesNetwork ZonesEnd Level 3 Node: Network Zones
   Start Level 2 Node: Adapter-Specific Security ConfigurationAdapter-Specific Security ConfigurationEnd Level 2 Node: Adapter-Specific Security Configuration
      Start Level 3 Node: Adapters and Runtimes on the Integration ServerAdapters and Runtimes on the Integration ServerEnd Level 3 Node: Adapters and Runtimes on the Integration Server
      Start Level 3 Node: Adapters Running in the Advanced Adapter EngineAdapters Running in the Advanced Adapter EngineEnd Level 3 Node: Adapters Running in the Advanced Adapter Engine
         Start Level 4 Node: RFC AdapterRFC AdapterEnd Level 4 Node: RFC Adapter
         Start Level 4 Node: SOAP AdapterSOAP AdapterEnd Level 4 Node: SOAP Adapter
         Start Level 4 Node: SAP Business Connector AdapterSAP Business Connector AdapterEnd Level 4 Node: SAP Business Connector Adapter
         Start Level 4 Node: Marketplace AdapterMarketplace AdapterEnd Level 4 Node: Marketplace Adapter
         Start Level 4 Node: RosettaNet RNIF AdaptersRosettaNet RNIF AdaptersEnd Level 4 Node: RosettaNet RNIF Adapters
         Start Level 4 Node: CIDX AdapterCIDX AdapterEnd Level 4 Node: CIDX Adapter
         Start Level 4 Node: File/FTP, JDBC, JMS, and Mail AdaptersFile/FTP, JDBC, JMS, and Mail AdaptersEnd Level 4 Node: File/FTP, JDBC, JMS, and Mail Adapters
      Start Level 3 Node: Adapters Running in the Adapter Engine (Java SE)Adapters Running in the Adapter Engine (Java SE)End Level 3 Node: Adapters Running in the Adapter Engine (Java SE)
   Start Level 2 Node: Further Security Tasks and TopicsFurther Security Tasks and TopicsEnd Level 2 Node: Further Security Tasks and Topics
      Start Level 3 Node: User Authorizations in Repository and DirectoryUser Authorizations in Repository and DirectoryEnd Level 3 Node: User Authorizations in Repository and Directory
      Start Level 3 Node: Protection of Sensitive Message DataProtection of Sensitive Message DataEnd Level 3 Node: Protection of Sensitive Message Data
         Start Level 4 Node: Messaging Components of the Integration EngineMessaging Components of the Integration EngineEnd Level 4 Node: Messaging Components of the Integration Engine
         Start Level 4 Node: Java-Based Messaging ComponentsJava-Based Messaging ComponentsEnd Level 4 Node: Java-Based Messaging Components
   Start Level 2 Node: AppendixAppendixEnd Level 2 Node: Appendix
   Start Level 2 Node: Security Guide Web ServicesSecurity Guide Web ServicesEnd Level 2 Node: Security Guide Web Services