In this chapter, we demonstrate the steps required for each of the use cases. These use cases show the principle functionality available in this secure portal implementation.