Contents

1 Introduction

2 Security Console

3 Implementation Users

4 User Categories

5 Application Users Management

6 Data Security Policies

7 Role Provisioning, Role Assignments, and Role Configuration

8 Location-Based Access

9 Single Sign-On

10 API Authentication

11 Export and Import of Security Setup Data

12 Security Certificates