+

Search Tips   |   Advanced Search

 

Example: Common Secure Interoperability V2 scenarios

 

The articles included in this section provide specific scenarios demonstrating how to configure Common Secure Interoperability V2 (CSIv2).


Sub-topics


Scenario 1: Basic authentication and identity assertion

Scenario 2: Basic authentication, identity assertion, and client certificates

Scenario 3: Client certificate authentication and RunAs system

Scenario 4: TCP/IP transport using a virtual private network

 

Related tasks


Configure IIOP authentication

 

Reference topic