Authentication and Authorization Security Requirements

If you do not effectively define security requirements in advance, you cannot evaluate the resulting system for success or failure prior to implementation. The features that currently exist determine how SAP Mobile Platform security is affected by your infrastructure.

Related concepts
Assessing High Availability and Disaster Recovery Objectives
Host Platform Requirements
SAP® Ecosystem Interoperability Requirements
Network Communications Requirements
EIS Requirements
Intrusion Detection and Protection Requirements