Check | Description |
---|---|
| The authentication strategy has been identified. |
| Privacy and integrity requirements of SOAP messages have been considered . |
| Identities that are used for resource access have been identified. |
| Implications of code access security trust levels have been considered. |