The following section describes the required security settings when you use the ICF for communications:
This section contains detailed information about the following topics:
User Administration and Authentication
Authorizations
Network Security and Communication
Trace Files and Log Files