Show TOC

Configuring Security in SAP Mobile PlatformLocate this document in the navigation structure

To administer security across SAP Mobile Platform, you need create and configure security profiles, assign authentication providers to security profiles, map SAP Mobile Platform logical roles to your physical roles, manage the keystore and truststore, ensure strong JVM encryption, and configure virus protection for the landscape. Then you should monitor and validate your security configuration to ensure system health.

Prerequisites

Review Planning Your Security Environment before proceeding with configuring SAP Mobile Platform security.

Procedure