This document has the objective to exemplify how SAP CDC/Gigya improve Customer Identity Security using RBA (Risk-Based Authentication).
The RBA is a layer of account security that can prevent malicious attacks and hacking attempts on your site.
I hope you enjoy it!!
1.3. Checking the Identity Access
1.4. Registering a new User into your Web Site (Computer)
1.5. Checking the Account Activation (Email)
1.6. Accessing the Web Site from a different device (Mobile)
Article: SAP CDC Gigya – Improving Customer Identity Security using RBA (Risk-Based Authentication)
IdentitySync is the functionality from SAP CDC/Gigya responsible for import or export user data from different sources. A common use of this tool is during the implementation phase when it is necessary to import the user data from another customer identity solution.
The objective of this document is to give an overview of this powerful ETL Solution.
1.2. FTP Area
1.3. Creating an IdentitySync Dataflow
1.4. Describing every Dataflow component
1.5. Configuring the FTP Component
1.6. Scheduling the export User data
1.7. Checking the LOG
1.8. Checking the file exported
1.9. General Information
Article: SAP CDC/Gigya – Exporting and Importing User Data using IdentitySync (ETL)
The SAP CDC (Gigya) is fully integrated by standard with many Solutions using GConnectors.
However, SAP CDC is extremely flexible to integrate your Ecommerce or Web Site home solutions
That´s the proposal of this document, provide a basic understanding of how to integrate your
1.2. Site´s Application Key
1.3. Creating a Web Page to call the SAP CDC.
1.4. Testing our first page
1.5. Checking the Facebook User Data
The objective of this document is to give a brief of how to validate data into SAP CDC Screen-Sets using REGEX.
REGEX is highly power functionality to allow the SAP CDC Consultant to validate data without programming, and keep your data trustable
1.2. Create a new Field into Site´s Schema
1.3. Adding the new field into the Registration Screen-Set
1.4. Testing field without any validation
1.5. Using REGEX during into the Schema
1.6. Testing the REGEX Validation