Figure 2: Authorization by using ServerProxy.
Back to Article