Supported Authentication Protocols
A version of this page is also available for
4/8/2010
With mobile devices providing connectivity for data access, secure communication is imperative. Remote access through the device, such as using the Internet, exposes the device to all known forms of attack and interception. To guard against these threats, devices can use the following authentication protocols.
See Also
Concepts
Troubleshooting SSL Connections