Administration → Security Administration → Authentication Realms and Users → PKI Certificate Authentication Configuration
For more details on configuring your implementation to use PKI Certificate authentication, see the following topics:
Copyright © 2011–2016 Serena Software, Inc. All rights reserved.