Configuring Runtime Security Using Access Control
In this section:
Overview
Logon Schemes
Configuring Credential Requirements
Realm Based Authentication
Role Based Authentication
Impersonation
This section describes how to configure run-time security using access control.
iWay Software