Symptom
You have a requirement to do information security control in the system. The security strategy requirements are the following two points:
- System to be bound to the MAC address of the user's computer.
- Two steps of validation, for example: you can generate dynamic encoding to the mailbox, and then log in according to the dynamic encoding.
Read more...
Environment
SAP Cloud for Customer
Product
SAP Cloud for Customer add-ins all versions ; SAP Cloud for Customer core applications all versions
Keywords
KBA , information security control , sso+idp , SRD-CC-IAM , Identity & Access Management , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.