Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

CONNECT

Transfer protocol details securely

  • Last UpdatedAug 21, 2025
  • 1 minute read

When you share digital identity and entitlement rights across security and enterprise boundaries, it is vital to consider your security requirements. For example, we recommend:

  • Only share information with contacts that need it. Avoid using the information directly in a support case or in emails with multiple recipients.

  • Communicate any client secrets separately to other configuration data.

  • Identify a secure and encrypted method for sharing information. If you use email, only use encrypted emails.

TitleResults for “How to create a CRG?”Also Available in