Version 9.8
Software AG Security Infrastructure

How to:
these pages

  Getting Started   Reference Guide to Security Infrastructure  
      Introduction to Security Infrastructure       Samples    
              Frequently Asked Questions    

Legal Notices

  Configuration   Using Security Infrastructure  
      Preparing JAAS Configuration Files       Authentication Process    
      Creating Technical User Credential Files       Configuration Parameters    
      Creating Internal User Repository Files       Predefined Login Modules    
      Creating Custom Keys and Certificates       Developing Login Modules    
              Using the LDAP Framework    
    Software AG Security eXtensions (SSX)  
      Usage of Pluggable Authentication Module (PAM) on UNIX  Copyright © 2008-2015 Software AG, Darmstadt, Germany.