The following are the items to consider when enabling external security for CA Ideal. Sites using an external security product to signon to the TP monitor should implement this method that extracts the security-id and removes dependencies on TP monitor-IDs.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|