Chapter 5
Chapter 6
SIP2 Authentication ........................................................................ 6-10
NTLM Authentication ...................................................................... 6-12
CAS Authentication ........................................................................ 6-30
Chapter 7
Chapter 8
Role Inheritance ............................................................................... 8-3
Defining a Role ................................................................................ 8-4
Modifying a Role ........................................................................... 8-10
BlueSecure™ Controller Setup and Administration Guide
Recovery State............................................................................ 4-26
Contents
v