The following sections describe shared schemas, and how to set them up:
Overview of Shared Schemas Used in Enterprise User Security
How Shared Schemas Are Configured for Enterprise Users
How Enterprise Users Are Mapped to Schemas
Scripting on this page enhances content navigation, but does not change the content in any way.