The topics listed below describe how to configure the connections to external security managers that the security facility will use to resolve queries.