Security uses multiple authentication mechanisms including a custom approach that uses shared secret keys.
The product supports the following security authentication schemes:
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |