you are configuring authentication for a pega web mashup implementation.
how do you ensure the host system origin is trusted?
in the authentication service JNDI binding parameters, specify the protocol, host, and port.
in the authentication service spaecify the IACAuthverification activity
in the application definition, specify the protocol, host, and port
in the content security policy record specify the website as allowed
Submit