This illustration shows the component-managed sign-on process. The client makes a request, which is associated with an incoming security context. As part of servicing the request, the application component maps the incoming security context to an outgoing security context and then uses the outgoing security context to request a connection to the EIS. As part of the connection acquisition, the resource adapter logs on to the EIS using the outgoing security context provided by the application component. Once the connection is acquired, the application component can interact with the EIS under the established outgoing security context.