About Managing Security
Once the security definitions are established, they must be managed from the product itself, and the security infrastructure and security repositories used.