Setting up the Security Identity Propagation sample

When you have imported the Security Identity Propagation sample, you can run the basic security credential extraction, programmatic mapping, and propagation demonstrations directly.

If you want to extend the sample to interact with your security system, for example, an LDAP server, you must first configure the sample to use that system. Configuring the sample to use an external system is detailed in the sections on extending the sample.

You can now run the Security Identity Propagation sample, see Running the sample.

Back to sample home