Note: This page uses Javascript. You are seeing this note because your browser either doesn't support Javascript or Javascript is turned off. To view this help system as it is meant to be viewed please use a Javascript enabled browser.
Collapse
Expand
Getting Started
CIC Administration Application Overview
CIC Application Setup Roadmap
Before you Begin
How to Use this Guide
CIC for P6 EPPM
Roadmap for Configuring CIC for P6
Managing P6 Users for CIC
Adding CIC Users
Assigning CIC Roles in Primavera Administration Application
Assigning Construction Intelligence Cloud Access for P6 Users
Configuring P6 EPPM Data Sources
Running ETLs and ODI Loads for P6 EPPM Data Sources
Reviewing the Status of P6 Publication Services
Configuring Benchmarking Groups for P6 Projects
Configuring Threshold Settings for P6 Data
CIC for Aconex
Roadmap for Configuring CIC for Aconex
Managing Aconex Users for CIC
Assigning CIC Roles in Primavera Administration Application
Assigning CIC Access to Aconex Users
Configuring Aconex Data Sources
Running ETLs for Aconex Data Sources
Configuring Threshold Settings for Aconex Data
CIC for Aconex and P6 EPPM
Managing P6 and Aconex Users for CIC
Standard Administration Tasks
Running the STARETL Process
Stopping the STARETL Process
Scheduling STARETL Runs
Starting and Restarting ODI Load Plans
Reviewing the Global Status of STARETL Runs
Accessing Log Files of STARETL Runs
Accessing Recent STARETL Run Reports and Logs
Working with the Machine Learning Workbench
Selection Criteria for Training ML Models
Using ML Workbench for P6 EPPM
Configuring and Training CIC Models with P6 Data
Using ML Workbench for Aconex
Configuring and Training CIC Models with Aconex Data
Managing Personal Information
About Consent Notices
About Personal Information
Configuring Consent Notices for Construction Intelligence Cloud
Your Responsibilities
Ensuring Privacy of Data Collection
Limiting Granular Access to Data
Ensuring Data Masking is Supported
Ensuring IP White-Listing
Controlling Access to Special Categories of Data
Security Considerations
Introduction
Authentication: How Users Sign On
Authorization: What Users can Access
Machine Learning Security Considerations
Endpoint Security
Inherent Risks and Practical Policies
Privacy and Personal Information
Some Security Basics
What's Next?
Copyright