Part IV. Securing

DOC relies on specific security concepts that must be taken into account.

  • Accesses to the application infrastructure components and to DOC web client are secured using specific credentials that should be updated regularly. For more details, refer to Chapter Configuring Credentials.

  • Accesses to the application elements depend on the role(s) that users have been assigned. For more details, refer to Chapter Managing Users.

  • Roles are themselves associated with specific permissions over application elements. For more details, refer to Chapter Setting Permissions.

  • API keys can be defined to further enhance security and to interact with DOC APIs. For more details, refer to Chapter Authenticating with API Keys.

  • Several metrics allow tracking user activity on the application. For more details, refer to Chapter Monitoring Activity.

[Note]

This Part contains detailed information on the application customization. Note that:

  • A deployed application is the result of the project development. For more details, refer to Part Getting Started.

  • The application services rely on specific concepts. For more details, refer to Part Understanding.

  • The application features can be tailored to meet the project requirements. For more details, refer to Part Customizing.