After you deploy the CA Access Control for Virtual Environments virtual appliance in your environment, complete the following procedures to configure the user store and database connection information.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |