Planning Your Security Landscape

The security support matrices detail how SAP Mobile Platform supports various security configurations for client authentication and when using SSO to your back-end system. To properly plan your security environment in SAP Mobile Platform, understand authentication types, and the corresponding supported authentication providers, client types, and applications.

Client authentication

When administering client authentication in SAP Mobile Platform, ensure you use supported authentication providers for your authentication and client types. Use this matrix to understand SAP Mobile Platform supported authentication scenarios for device (client) to SAP Mobile Platform Server connections, and the corresponding supported application types.

SAP Mobile Platform Client Authentication Matrix
Authentication Type Description Authentication Provider(s) Native Application Support Hybrid Application Support Agentry Application Support
Anonymous No authentication of users, and grants read-only access to application data by assigning the anonymous security profile to the application,
Note: Read-only access is dependent on how the application is configured. If the back-end connection has been configured to connect to a technical user, it is possible for clients to perform write operations.
  • No specific authentication provider is required.
Note: Do not use the No Authentication Challenge provider if you use back-end SSO.
Yes Yes Yes
Basic authentication User name and password authentication
  • HTTP/HTTPS Authentication
  • Directory Service (LDAP/AD)
  • System Login (Admin Only)
  • No Authentication Challenge
Yes Yes Yes
External token-based SSO The application has custom code or logic to obtain a security token from a service external to SAP Mobile Platform. This token is added into the HTTP header and SAP Mobile Platform uses it for authentication.

Site Minder is an example of a token-based SSO implementation.

  • Populate JAAS Subject From Client
  • HTTP/HTTPS Authentication
Yes No No
Network-edge token-based SSO The user enters credentials (either user name and password or X.509 certificate), and the credentials are checked at the network edge. When the network edge determines the credentials are valid, it may introduce a security token into the proxies client request (typically a cookie), and SAP Mobile Platform validates the security token rather than the original user credentials.

Site Minder is an example of a token-based SSO implementation.

  • Populate JAAS Subject From Client
  • HTTP/HTTPS Authentication
Yes Yes Yes
X.509 certificate Mutual certificate authentication
  • X.509 User Certificate
Yes Yes No

Single sign-on to back-end systems

When administering SSO to your back-end system with SAP Mobile Platform, make sure you use supported authentication providers for your SSO mechanism and application types. Use this matrix to understand SAP Mobile Platform supported authentication scenarios for SAP Mobile Platform Server to back-end connections, and the corresponding supported application types.

SAP Mobile Platform SSO Authentication Matrix
SSO Mechanism Description Authentication Provider(s) Native Application Support Hybrid Application Support Agentry Application Support
Basic authentication User name and password authentication
  • HTTP/HTTPS Authentication
  • No Authentication Challenge
Yes Yes Yes
SSO2 Token HTTP headers or cookies that have an SSO value integrated with the customer's SSO systems. Use the HTTP/HTTPS Authentication provider to retrieve a MYSAPSSO2 cookie from a Net Weaver token-issuing service.
Note: Site Minder SSO tokens can be used against Net Weaver to retrieve the MYSAPSSO2 cookie.
  • HTTP/HTTPS Authentication
Yes No No
X.509 single sign-on Mutual certificate authentication
  • Populate JAAS Subject From Client
  • X.509 User Certificate
Note: You must configure the application connection to use the certificate alias in the server keystore that should be used to make the HTTPS connection to the back end.

The specified technical user certificate (configured using the certificate alias in the application definition) should be capable of impersonating the end user. The back end should be configured to trust the technical user to have validated the end user certificate. Configure this according to your specific back end in use.

The CA certificate that signed the back end server certificate should be imported into the SAP Mobile Platform keystore/truststore.

Yes Yes No
Related tasks
Platform Security Quick Start
SAP Mobile Platform Authentication Quick Start