In addition, consider the level of security to configure applications. The security mechanisms support various levels of user authentication, and also authentication and encrypted communication between applications. Ensure that you understand the capabilities described in the System Administration Guide and then choose a level of security that is appropriate for the deployment.