Retrieve Access Control Lists and Identify the Security Type

The following configuration settings are sufficient to configure most connectors for mapped security. However, some connectors require additional or different configuration, so HPE recommends that you refer to the documentation for your connectors.


_HP_HTML5_bannerTitle.htm