This quick-start task flow identifies security setup activities in an SAP Mobile Platform environment. Activities performed by the SAP Mobile Platform administrator, may also require the collaboration or participation of mobile application developers, or Afaria, security, or database administrators, depending on the role distribution within your organization.
Plan your security landscape based on your required authentication and client types, as well as the single sign-on (SSO) requirements to your back-end systems. See Planning Your Security Landscape.
|Task||Anonymous Authentication||Basic Authentication||Token-Based Authentication||Certificate-Based Authentication|
|Configure security profiles||Configuring Security Profiles|
|Map logical roles to physical roles||Not applicable||Mapping a Logical Role to a Physical Role|
|Integrate your SSO solution into the platform||Not applicable||Basic Authentication Against an SSO-Integrated Service||Token-Based SSO Authentication||Integrating with Single Sign-On Solutions|
|Manage keystore and truststore certificates||Not applicable||Not applicable||Not applicable||Managing Keystore and Truststore Certificates|
|Deploy applications||Deploy Applications|