Example: CSIv2 scenariosThe articles included in this section are intended to demonstrate how to configure specific CSIv2 configuration examples.
See AlsoScenario 1: Basic authentication and identity assertion
Scenario 2: Basic authentication, identity assertion and client certificates
Scenario 3: Client certificate authentication and RunAs system
Scenario 4: TCP/IP transport using a Virtual Private Network
Scenario 5: Interoperability with WAS Version