Retrieve Access Control Lists and Identify the Security Type

The following configuration settings are sufficient to configure most connectors for mapped security. However, some connectors require additional or different configuration, so Micro Focus recommends that you refer to the documentation for your connectors.

_FT_HTML5_bannerTitle.htm