In the third phase, you complete the Enterprise User Security configuration based on the authentication method you have chosen. Go to one of the following sections:
"Configuring Enterprise User Security for Password Authentication"
"Configuring Enterprise User Security for Kerberos Authentication"
"Configuring Enterprise User Security for SSL Authentication"
See Also:
Table 1-1 for a comparison of the benefits provided by password, Kerberos, and SSL authentication for Enterprise User Security