Security Guide
Red Hat JBoss Data Virtualization 6.2
This guide is intended for administrators
Abstract
This document provides information on configuring security for JBoss Data Virtualization.
Abstract
We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.