Operating Systems: i5/OS
             Personalize the table of contents and search results

 

Example: Common Secure Interoperability V2 scenarios

 

The articles included in this section provide specific scenarios demonstrating how to configure Common Secure Interoperability V2 (CSIv2).


Sub-topics


Scenario 1: Basic authentication and identity assertion

Scenario 2: Basic authentication, identity assertion, and client certificates

Scenario 3: Client certificate authentication and RunAs system

Scenario 4: TCP/IP transport using a virtual private network

 

Related tasks


Configuring IIOP authentication

 

Reference topic