DOC
relies on specific security concepts that must be taken into account.
Accesses to the application infrastructure components and to DOC
web client are secured using specific credentials that should be updated regularly. For more details, refer to Chapter Configuring Credentials.
Accesses to the application elements depend on the role(s) that users have been assigned. For more details, refer to Chapter Managing Users.
Roles are themselves associated with specific permissions over application elements. For more details, refer to Chapter Setting Permissions.
API keys can be defined to further enhance security and to interact with DOC
APIs. For more details, refer to Chapter Authenticating with API Keys.
Several metrics allow tracking user activity on the application. For more details, refer to Chapter Monitoring Activity.
This Part contains detailed information on the application customization. Note that:
|