iWay Service Manager Security Guide
>
Configuring Runtime Security Using Access Control
Configuring Runtime Security Using Access Control
Topics:
Runtime Security Overview
Logon Schemes
Configuring Credential Requirements
Realm Based Authentication
Role Based Authentication
Impersonation
This section describes how to configure run-time security using access control.