Table of Contents
- List of Figures
- List of Tables
- Title and Copyright Information
- Send Us Your Comments
- Preface
- 1 Overview
- 2 Security Model
-
3
Application Security
- EICS Application Security
- Role Management
- Assigning Stores to a User
- Assigning SIOCS Application Roles to a User
- Mass Assigning SIOCS Application Roles and Stores
- Deleting an EICS User Profile
- Importing a Batch of User Accounts
- Bulk IDCS or OCI IAM Application Role Membership Update (Optional)
- Bulk Group Membership Update (Optional)
- Personal Data
- Regulatory Compliance