The following sections describe some of the important objects that can be used by your security policy to authorize access to your enterprise applications and data.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |