4.10 Security Configuration

The following sections describe various security configurations.