Start Level 1 Node: Portal Security GuidePortal Security GuideEnd Level 1 Node: Portal Security Guide
   Start Level 1 Node: Before You StartBefore You StartEnd Level 1 Node: Before You Start
   Start Level 1 Node: User Administration and AuthenticationUser Administration and AuthenticationEnd Level 1 Node: User Administration and Authentication
      Start Level 2 Node: User ManagementUser ManagementEnd Level 2 Node: User Management
      Start Level 2 Node: User Data SynchronizationUser Data SynchronizationEnd Level 2 Node: User Data Synchronization
      Start Level 2 Node: AuthenticationAuthenticationEnd Level 2 Node: Authentication
      Start Level 2 Node: Integration Into Single Sign-On EnvironmentsIntegration Into Single Sign-On EnvironmentsEnd Level 2 Node: Integration Into Single Sign-On Environments
   Start Level 1 Node: AuthorizationsAuthorizationsEnd Level 1 Node: Authorizations
      Start Level 2 Node: Portal RolesPortal RolesEnd Level 2 Node: Portal Roles
   Start Level 1 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 1 Node: Network and Communication Security
   Start Level 1 Node: Data Storage SecurityData Storage SecurityEnd Level 1 Node: Data Storage Security
   Start Level 1 Node: Operating System SecurityOperating System SecurityEnd Level 1 Node: Operating System Security
   Start Level 1 Node: Protection Against Clickjacking (Framing Protection)Protection Against Clickjacking (Framing Protection)End Level 1 Node: Protection Against Clickjacking (Framing Protection)
   Start Level 1 Node: Dispensable Functions with Impacts on SecurityDispensable Functions with Impacts on SecurityEnd Level 1 Node: Dispensable Functions with Impacts on Security
   Start Level 1 Node: Other Security-Relevant InformationOther Security-Relevant InformationEnd Level 1 Node: Other Security-Relevant Information
   Start Level 1 Node: Logging and TracingLogging and TracingEnd Level 1 Node: Logging and Tracing
   Start Level 1 Node: AppendixAppendixEnd Level 1 Node: Appendix