5.2.5 Setting Security Scenario

This section provides an example of step-by-step instructions for setting up security in an application that has already been configured.