This illustration shows the container-managed sign-on process. The client makes a request, which is associated with an incoming security context. As part of servicing the request, the application component requests a connection to the EIS. As part of the connection acquisition, the container maps the incoming security context to outgoing security context, based on deployment descriptor elements (not shown in the figure) or authentication class provided. The resource adapter logs on to the EIS using the outgoing security context provided by the container. Once the connection is acquired, the application component can interact with the EIS under the established outgoing security context.