2 Security Features This chapter covers the following topics: Configuring Authentication Configuring Privileges and Role Authorization Configuring Secure Communication Configuring and Using Target Credentials Configuring and Using Cryptograhic Keys Configuring and Managing Audit Additional Security Considerations Privileged Access Management Integration