The ping example demonstrates the use of a security configuration to control interactions between entities.
In this section
About the ping example
Client entity implementation
Server entity implementation
Description files
flow-based security configuration
era-based security configuration
Building and running the ping example