This section contains the following topics:
Constructing an External Resource Name
Defining External Signon Security
External Database Security Considerations
Identifying Authorities to the External System
|
Copyright © 2014 CA.
All rights reserved.
|
|