JavaScript must be enabled in order to use this site.Please enable JavaScript in your browser and refresh the page. Configuration examples A number of use cases illustrate the various configurations available in flexible authentication. Parent topic: Flexible Authentication