List of Tables List of Tables 2-1 Security Terms 2-2 IDCS or OCI IAM Application Roles 2-3 Predefined Application Roles 2-4 User Types with IDCS or OCI IAM Application Roles, IDCS or OCI IAM Group, and SIOCS Application Roles