Is User 'Sally Smith' Really Who She Claims to Be?! Lessons for Establishing Rock-Solid Authentication and Single Sign-On (SSO) Practices

Authentication forms the foundation of your security infrastructure, and access privileges granted to users (or systems) are predicated on the notion that users are who they claim to be. There are a number of options available to help you do this with SAP systems, including password parameters, secure network communications (SNC), X.509 digital certificates, and…...

This content is available to SAPinsider Premium Members.
Please click below to log in or create an account

Login Now »

Create Acount»