If you do not effectively define security requirements before
installing SAP Mobile Platform, you cannot evaluate the resulting system
for success or failure prior to implementation. SAP Mobile Platform security features are affected by your current
infrastructure.
- Roles and distribution of assignments – to
prevent mapping collisions, identify the roles that need to exist, and how
to map them.
- Security provider strategy – identify the existing built-in security providers, and the
ones you can create using the CSI API. The security providers you configure
in SAP Mobile Platform pass
authentication and authorization information to the providers in your
environment. Identifying the providers simplifies the implementation of a
security configuration by the platform administrator after installation. If
you are using single sign-on (SSO) with a security provider, you may also
need to prepare libraries and other back-end components.