2.9 Configuring Single Sign-On to Specific Applications