Follow

Security Flow Chart and Documentation Overview

The diagram below shows the steps involved in retrieving protected content, either via logging in to an external system or integrating with the vendor ecosystem store such as iTunes, Google Play, Amazon and so on. For example step, the diagram indicates where you can get more detail.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

Powered by Zendesk