Operating Systems: i5/OS
             Personalize the table of contents and search results
 
Example: Common Secure Interoperability V2 scenarios
 
The articles included in this section provide specific scenarios
demonstrating how to configure Common Secure Interoperability V2 (CSIv2).
Sub-topics
Scenario 1: Basic authentication and identity assertion
Scenario 2: Basic authentication, identity assertion, and client certificates
Scenario 3: Client certificate authentication and RunAs system
Scenario 4: TCP/IP transport using a virtual private network
 
Related tasks
Configuring IIOP authentication   
 
Reference topic