| No
				Authentication Challenge | Provider that always authenticates the supplied user. The provider offers pass-through
								security for SAP Mobile Platform Server, and should typically
								be reserved for development or testing.
									SAP strongly encourages you to
								avoid using this provider in production environments—either
								for administration or device user authentication. | 
| System
				Login (Admin Only) | Provider that is configured by the installer with the initial administrator
								credentials only to give platform administrator access to
									Management Cockpit, so that
									SAP Mobile Platform Server can be configured for
								production use. Administrators are expected to replace this
								authentication
								provider immediately upon logging in for the first
								time. SAP encourages you to avoid
								using this provider in production environments. | 
| Populate JAAS Subject From Client | Provider that enables administrators to add client values as named credentials, name
								principals, and role principals to the authenticated subject.
								This
								provider copies values from the client's HTTP request into the JAAS
								subject as: Adding
								client values as named credentials allows them to be used for single
								sign-on.Principals - identifies the user Roles - grants access rights to
											SAP Mobile Platform protected
										resourcesCredentials - provides single-sign-on material to use when
										connecting to back-end systems
 | 
| X.509 User Certificate | Provider to use when the user is authenticated by certificates. This provider can be
								used in conjunction with other
								authentication
								providers that support certificate authentication
								[for example, Directory Service (LDAP/AD)], by configuring X.509 User Certificate before the
								authentication
								providers that support certificate authentication.
								You can only use this provider to validate client certificates when
								HTTPS listeners are configured to use mutual
									authentication. Note: Agentry clients on iOS and Android do not
									support client/user certificates. Agentry clients on Windows and
									Windows CE support client-side certificates, but Agentry cannot
									use these certificates for user identification; Agentry requires
									separate user
									name
									and
									password
									authentication as well. | 
| HTTP/HTTPS Authentication | Provider that authenticates the user with
								given
								credentials (user name and password, or SSO tokens from your SSO
								system) against a back end that is integrated to the your management
								or SSO systems. Optionally this provider may retrieve a cookie that
								represents additional SSO credentials to use for back-end systems
								that are also integrated with  your SSO
								system. | 
| Directory Service
				(LDAP/AD) | Provider that integrates with the your Active Directory or other
								Directory Server identity management system using LDAP. It first
								connects to your Directory Server using a technical user identity so
								it can perform an LDAP search to discover the fully qualified
								distinguished name (DN) of the current user in the directory. It
								then performs a bind to that DN with the provided password. When the
								bind succeeds, the user is considered authenticated. The provider
								then performs an LDAP search to see which groups the user is a
								member of. These group names are then considered as physical roles
								in the role mapping definitions that are used later for access
								controls. This provider is particularly useful in the Admin
									security profile to grant existing enterprise users usage of the
										Management Cockpit, and also any custom
									security profiles used for authenticating enterprise users for
										SAP Mobile Platform application
									usage. |