Different security providers allow users to supply different user credentials. If your security policy mandates that a specific credential type or strength be used, review the providers that are available to you.
| Credential | Providers Available |
|---|---|
| User name and password | LDAP, NTProxy, HTTP |
| E-mail address and password. Note that E-mail addresses must follow certain requirements for SAP Mobile Platform to recognize them correctly, especially when a security configuration is defined with it. | LDAP, HTTP |
| X.509 certificates | Certificate, SAP SSO |
| Tokens | HTTP |