Device Security

To fully secure devices, developers and administrators can combine multiple mechanisms. In addition to using the built-in security features of both the device and SAP Mobile Platform, SAP recommends that you also use Afaria so you can remotely initiate security features as required.

Application authentication is defined by the developer, managed by the administrator in the Management Cockpit, and processed by the core CSI in SAP Mobile Platform Server.

Device security in SAP Mobile Platform follows this process:
  1. The client sends the application ID and user credentials (including user name and password, certificate, or token) to SAP Mobile Platform.
  2. SAP Mobile Platform uses the application ID to find the security profile that should authenticate the user credentials, and invokes the authentication providers in that profile to perform the authentication.
  3. When authentication succeeds, the user credentials or additional credentials derived during the authentication process are made available as SSO material towards the back-end systems.
In SAP Mobile Platform Server, the client always provides the credentials defined in their security profile, and not the back-end system. If you are configuring multiple back ends, then following options are possible:

Developers define SAP Mobile Platform security features for devices, including data encryption, login screens, and data vaults for storing sensitive data. Developers use the Client Hub, integrated with Logon Manager, which simplifies user onboarding and configuration to enable easier and faster enterprise-wide deployments. The Client Hub reduces the effort required by the end user to manage multiple passwords for mobile applications and improves the user experience.