You can implement instant messaging authentication and adapt it to the needs of your network.
Complete the following high-level steps.
- Import the IM Authentication rule set from the library.
- Review the rules in the rule set and modify them as needed.
You can, for example, do the following:
- Modify the settings of the Authentication module for the User Database or the Authentication Server method.
- Modify the settings of the logging module that handles the logging of information about instant messaging authentication.
- Save your changes.