Previous Topic: Dynamic Security RefreshNext Topic: SRTT Requirements


Using External Security

This section contains the following topics:

SRTT Requirements

Constructing an External Resource Name

Defining External Signon Security

External Database Security Considerations

Identifying Authorities to the External System