Is there any documentation or experience for scalability of Web Auth pass-through scalability?
I am looking for any real world type information as to the upper limits of users, APs or auth-transactions that may degrade the web-auth process in the ...