Configuration examples

A number of use cases illustrate the various configurations available in flexible authentication.