Product Lifecycle Management Blogs by SAP
Dive into product lifecycle management news, learn about digitalizing PLM for the digital supply chain, and stay informed with product updates from SAP.
cancel
Showing results for 
Search instead for 
Did you mean: 
camilapetry
Product and Topic Expert
Product and Topic Expert
933

If you’re an SAP Fieldglass Configuration Manager user, you have some special powers. One of them is changing your company’s config in a blink of an eye, but did you know you also have the ability to protect your company's sensitive info? In today’s digital landscape, with data breaches and cyber threats on the rise, safeguarding confidential information is on top of everyone’s mind.

Use the Encryption Keys and Certificates tile on the Configuration Manager self-service dashboard to create and manage your company’s different types of security assets and be called a superhero!

camilapetry_0-1724768672883.png

Simplifying Security Asset Management

Business applications handle confidential data, and securing this data often involves complex encryption processes. But managing these essential security assets doesn’t have to be complex! The Encryption Keys and Certificates tile makes it easy for you. Check what you can do with this feature:

  • Create and Manage Assets: easily generate and handle encryption keys and certificates, ensuring that sensitive data remains protected across all business applications.
  • Reduce Duplication: by consolidating key and certificate management into a single interface, SAP Fieldglass reduces duplication of code and processes, making your security practices more efficient.
  • Ensure Compliance and Oversight: Information Security departments, auditors, and other stakeholders can review and verify the security assets and methods used to protect confidential information, ensuring that your practices meet the security standards.

camilapetry_1-1724768795717.png

Take a look at the asset options this feature provides:

  • (PGP) Key
  • Public Key Infrastructure (PKI)
  • Symmetric Key (DEK)
  • X.509
  • SSH Key

----------------------------------------------------------------------------------------------------------------------------------------------

Elevate your data security practices with the Encryption Keys and Certificates. Create, generate, activate, rotate, and revoke encryption keys with ease. And let the system manage key storage and retrieval. It’s its job after all 😉

Disclaimer: the characters from Justice League mentioned in this content are the intellectual property of DC Comics and Warner Bros. Entertainment Inc. We are using these characters purely for non-commercial purposes and do not intend to gain any monetary benefits from their use. We acknowledge and respect the rights of DC Comics and Warner Bros. Entertainment Inc. as the rightful owners.

6 Comments
augustopresa
Advisor
Advisor

Thank you for this helpful post! The Encryption Keys and Certificates feature is a game-changer for managing security assets and protecting sensitive information.

Munique
Advisor
Advisor

Love the content and how easy to read it is. Thanks Camila!

dkreuz
Associate
Associate

Great blog, a succinct and easy to understand explanation of this important security feature of the application.

MaxMartim
Advisor
Advisor

Excellent content, you rocked it!

gcarmos
Product and Topic Expert
Product and Topic Expert

I'm loving this series!

GuilhermeVargas
Advisor
Advisor

Great content, easy to understand and very informative, thanks Camila!

Top kudoed authors