Implementation Guide › Configuration Considerations
This section contains the following topics:
Security Zones
Multiple Data Centers
Authentication and a Centralized Login Server