Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All
Collapse the table of content
Expand the table of content
Expand Minimize

How To Authenticate

This section provides procedural information for securing your cluster.

This section includes:

Did you find this information useful? Please send your suggestions and comments about the documentation to acdocs@microsoft.com

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft