If you do not
effectively define security
requirements in
advance,
you cannot evaluate
the resulting system
for
success or failure prior to implementation.
The
features that currently exist determine how
SAP Mobile Platform security is affected by
your
infrastructure.
- Roles and distribution of assignments – you can map roles at various levels: domain, security
configuration, application, and package. To prevent mapping collisions,
identify the roles that need to exist, and how to map them.
- Security provider strategy – identify the existing built-in security providers, and the
ones you can create using the CSI API. The security providers you configure
in SAP Mobile Platform pass
authentication and authorization information to the provider used in your
environment. Identifying the providers simplifies the implementation of a
security configuration by the platform administrator after installation. If
you are using SSO with a security provider, you may also need to prepare
libraries and other back-end components. See the postinstallation
requirements documented in Stage 3: Implement.