Go to main content
3/47
List of Figures
1-1 The OPSS Architecture
2-1 Application Policy Logical Model
7-1 The OPSS Identity Store Service
10-1 The Create Key Dialog
10-2 The Create Key Dialog
12-1 Audit Architecture
13-1 Common and Custom Audit Tables
13-2 Audit Base and Component Tables
15-1 Applications, Security Stores, and Management Tools
15-2 Identity Propagation with HTTP Calls
15-3 Mapping of Application Roles to Users and Groups
15-4 Application Life Cycle Phases
22-1 Integrating Applications with the Audit Framework
Scripting on this page enhances content navigation, but does not change the content in any way.