Planning for claims-based authentication

The following section covers considerations to be made and actions to be taken prior to a claims-based authentication deployment.

Send comments about this article to Microsoft.

© 2012 Microsoft Corporation. All rights reserved.
Show: