Managing Security
Once the security definitions are established, they must be managed from the application itself, using the security infrastructure and security repositories.
The following topics are included: