8.0 Security Best Practices

This section contains a description of potential security issues with the Role Mapping Administrator.

For additional information about securing your Identity Manager system, see the Identity Manager 3.6 Security Guide.