Version 9.5 SP1
Software AG Security Infrastructure

How to:
these pages

  Getting Started   Reference Guide to Security Infrastructure  
      Introduction to Security Infrastructure       Samples    
              IAF Samples    
                Frequently Asked Questions    
                Deprecated Login Modules    

Legal Notices

    Configuration   Using Security Infrastructure  
      Preparing JAAS Configuration Files       Authentication Process    
      Creating Technical User Credential Files       Configuration Parameters    
      Creating Internal User Repository Files       Predefined Login Modules    
      Creating Custom Keys and Certificates       Developing Login Modules    
              Using the LDAP Framework    
    Integrated Authentication Framework (IAF)   Software AG Security eXtensions (SSX)  
      Introduction to IAF       Usage of Pluggable Authentication Module (PAM) on UNIX    
      Installing IAF            
      Configuring IAF            
      IAF Tools       Copyright © 2008-2013 Software AG, Darmstadt, Germany.