Configuring security after installing runtime components is dependent upon the successful completion of SAP Control Center postinstallation tasks. Perform the security postinstallation tasks once SAP Control Center is functionally stable.
| Task | Complete? |
|---|---|
| Secure the infrastructure of data tier components. See Securing the Data Infrastructure in the Security guide. | |
| Prepare the runtime environment according to your backup and recovery strategy, and secure the identified backup artifacts. See Backup and Recovery in the System Administration guide. | |
| Secure the data tier databases by changing default passwords and encrypted data in the database file. See Securing Data Tier Databases in the Security guide. | |
| (Upgrade) Create and map an SUP Push User logical role for each security configuration used to authorize incoming push notifications. See Mapping DCN or Push Roles to a User Name Defined In PreconfiguredUserLoginModule in the Security guide. |
Once these are complete, perform any other necessary security administration tasks. See Securing Data in Motion Quick Start and Securing Access Quick Start in Security.