SAP Knowledge Base Article - Preview

2757461 - What is the Scope of Implementing Information Security Control in C4C?

Symptom

You have a requirement to do information security control in the system. The security strategy requirements are the following two points:

  1. System to be bound to the MAC address of the user's computer.
  2. Two steps of validation, for example: you can generate dynamic encoding to the mailbox, and then log in according to the dynamic encoding.


Read more...

Environment

SAP Cloud for Customer

Product

SAP Cloud for Customer add-ins all versions ; SAP Cloud for Customer core applications all versions

Keywords

KBA , information security control , sso+idp , SRD-CC-IAM , Identity & Access Management , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.