List of Figures
- 1-1 Architecture of the UNIX Connector
 - 2-1 Overall Flow of the Process for Creating an Application By Using the Connector
 - 3-1 Default Attribute Mappings for UNIX User Account
 - 3-2 Default Attribute Mappings for Secondary Group Entitlement
 - 3-3 Default Attribute Mappings for Generic UNIX Trusted User Account
 - 3-4 Simple Correlation Rule for a UNIX Target Application
 - 3-5 Predefined Situations and Responses for a UNIX Target Application
 - 3-6 Simple Correlation Rule for a UNIX Authoritative Application
 - 3-7 Predefined Situations and Responses for a UNIX Authoritative Application