Previous Topic: Set Up the Policy Domain

Next Topic: Authenticate Users in Heterogeneous RADIUS Environments with One User Directory

Create the Authentication Scheme

You can use any of the following authentication schemes:

Note: For more information on creating an authentication scheme, see the Authentication Schemes chapter in this guide.


Copyright © 2010 CA. All rights reserved. Email CA about this topic