Export (0) Print
Expand All

5.1 Security Considerations for Implementers

This protocol relies on the web server that hosts the application to perform authentication.

Show:
© 2015 Microsoft