The following tables will help you configure authentication schemes. Each table applies to a particular authentication scheme type and contains the following information:
The values in the Information Type column can be used for different purposes in different authentication schemes. For example, with TeleID authentication schemes, the shared secret is used to supply the encryption seed.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |