The security information used by the connector to connect to the database or EIS system can be provided in three ways: –By the Container, using information in the deployment of the Connector –By the Container, using a separate Security Domain –By the Application
Read More - Register for Free Membership