List of Figures List of Figures 1-1 EICS Platform 2-1 EICS Security Model 2-2 IDCS Access Management 3-1 Key Generator 3-2 Key Generator Progress 3-3 Advanced Site Settings Dialog 3-4 Private Key File Loaded 3-5 <SFTP User> Directory 3-6 Transferring Empty File 3-7 Transferring Multiple Files 3-8 Transferring .complete Files