This quick start task flow identifies security setup activities in an SAP Mobile Platform environment. Activities performed by the SAP Mobile Platform administrator, may also require the collaboration or participation of mobile application developers, or Afaria, security, or database administrators, depending on the role distribution within your organization.
Task | Anonymous Authentication | Basic Authentication | Token-based Authentication | Certificate-based Authentication |
---|---|---|---|---|
Configure security profiles | Configuring Security Profiles | Configuring Security Profiles | Configuring Security Profiles | Configuring Security Profiles |
Map a logical role to a physical role | Not applicable | Mapping a Logical Role to a Physical Role | Mapping a Logical Role to a Physical Role | Mapping a Logical Role to a Physical Role |
Integrate SAP Mobile Platform with your SSO solution | Not applicable | Not applicable | Integrating SAP Mobile Platform with Your SSO Solution | Not applicable |
Manage keystore and truststore certificates | Not applicable | Not applicable | Not applicable | Managing Keystore and Truststore Certificates |
Deploy applications | Deploy Applications | Deploy Applications | Deploy Applications | Deploy Applications |