Abstract:
In response to requests from a manager to the agents for connections to the applications executing, the agents authenticate the manager. In response to the authenticating, the agents establish connections to the applications. In response to the establishing of connections, the agents provide the connections to the manager.