Operation schemes of SSO technologies#
This section provides operation schemes of common single sign-on technologies such as OAuth 2.0 and SAML.
Site Navigation
In this document
Deployment
Basic configuration
Access to applications and network services
Customization with Java code
UI design and texts
Configuration file settings
Security, maintenance, and troubleshooting
This section provides operation schemes of common single sign-on technologies such as OAuth 2.0 and SAML.