Example: Common Secure Interoperability V2 scenarios
The articles included in this section provide specific scenarios demonstrating how to configure Common Secure Interoperability V2 (CSIv2).
Sub-topics
Scenario 1: Basic authentication and identity assertion
Scenario 2: Basic authentication, identity assertion, and client certificates
Scenario 3: Client certificate authentication and RunAs system
Scenario 4: TCP/IP transport using a virtual private network
Related tasks
Configure IIOP authentication
Reference topic