changes.mady.by.user Justin Latimer
Saved on Jul 17, 2013
Once a token has been obtained from either the Internal or External authentication sources, it can be used to authenticate requests on behalf of a user.
...