Configure Connectors

This section describes how to configure your connectors for mapped security.