Operating Systems: i5/OS
Personalize the table of contents and search results
Example: Common Secure Interoperability V2 scenarios
The articles included in this section provide specific scenarios
demonstrating how to configure Common Secure Interoperability V2 (CSIv2).
Sub-topics
Scenario 1: Basic authentication and identity assertion
Scenario 2: Basic authentication, identity assertion, and client certificates
Scenario 3: Client certificate authentication and RunAs system
Scenario 4: TCP/IP transport using a virtual private network
Related tasks
Configuring IIOP authentication
Reference topic