Previous Topic Next topic Print topic


Configuring Security Managers

The topics listed below describe how to configure the connections to external security managers that the security facility will use to resolve queries.

Previous Topic Next topic Print topic