No Authentication Challenge Configuration Properties

The No Authentication Challenge provider offers pass-through security for SAP Mobile Platform Server, and should typically be reserved for development or testing. SAP strongly encourages you to avoid using this provider in production environments for both administration and device user authentication.

Description

This provider provides authentication services. You need to configure only the authentication properties for the No Authentication Challenge provider.

Note:
  • If you use Allow Anonymous Access for a native OData application, do not also assign the No Authentication Challenge security profile to the application; anonymous OData requests are not sent, and Status code: 401 is reported.
  • For Agentry applications, a common scenario is to configure No Authentication Challenge as the security provider, so that only Agentry performs authentication.

Properties

Authentication Properties
Property Default Value Description
Control Flag Optional
Indicates how the security provider is used in the login sequence.
  • Optional – the authentication provider is not required, and authentication proceeds down the authentication provider list, regardless of success or failure.
  • Sufficient – the authentication provider is not required, and subsequent behavior depends on whether authentication succeeds or fails.
  • Required – the authentication provider is required, and authentication proceeds down the authentication provider list.
  • Requisite – the authentication provider is required, and subsequent behavior depends on whether authentication succeeds or fails.
Description None

(Optional) A meaningful string that describes the providers usage.

A description makes it easier to differentiate between multiple instances of the same provider type; for example, when you have multiple authentication providers of the same type stacked in a security profile, and each targets a different repository.

Related concepts
No Authentication Challenge Provider
Related tasks
Creating and Configuring Security Profiles
Mapping a Logical Role to a Physical Role