Table of Contents
- List of Examples
- List of Figures
- List of Tables
- Title and Copyright Information
- Send Us Your Comments
- Preface
- 1 Overview
- 2 Security Model
- 
               
               
                  
                  3
                      Application Security 
               
                  
               
               
               - EICS Application Security
- Role Management
- Assigning Stores to a User
- Assigning SIOCS Application Roles to a User
- Mass Assigning SIOCS Application Roles and Stores
- Deleting an EICS User Profile
- Importing a Batch of User Accounts
- Bulk IDCS or OCI IAM Application Role Membership Update (Optional)
- Nightly Batch File Uploads
- Export File Downloads
- Web Services Security
- Personal Data
- Regulatory Compliance