Transfer protocol details securely
- Last UpdatedAug 21, 2025
- 1 minute read
When you share digital identity and entitlement rights across security and enterprise boundaries, it is vital to consider your security requirements. For example, we recommend:
-
Only share information with contacts that need it. Avoid using the information directly in a support case or in emails with multiple recipients.
-
Communicate any client secrets separately to other configuration data.
-
Identify a secure and encrypted method for sharing information. If you use email, only use encrypted emails.