This section contains the following topics:
Purpose of External Security
User Access Requirements to Resources
SAF Requirements