Previous Topic: How You Provide Custom FunctionalityNext Topic: Discovering Your Enterprise


User Available Functions

You have access to the following functions when writing customized authentication. Function pointers to the functions are supplied inside the data structure supplied to verifyCert.