Previous Topic: pam_seosNext Topic: Checking User Inactivity


Restrictions and Limitations

The protection techniques described in this section have the following restrictions and limitations: