@@ -11,12 +11,12 @@ In order to get access to Informatica Intelligent Cloud Services (IICS), please
Someone will get back to you within 3 business days with next steps, including instructions to get access.
Depending on your use case, we might schedule a meeting to discuss your use case further and decide on next steps.
## Next Steps
## Access Control
Access to IICS is controlled through Manifest. Please refer to [This Documentation](./manifest-users.md) for more information.
The Integration Platform team will work with you to give you access to IICS.
Access is controlled through Manifest.
See [this document](./howto.md#how-to-create-a-manifest-group-for-your-team-for-access-control) for more information.
We will also work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case.
## Next Steps
After getting access to IICS, you can start [training](./training/training.md), follow [tutorials](./tutorials.md), and start implementing your integration(s).
Our team will work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case.
Informatica also provides documentation to get started (e.g. [getting started guide for Cloud Application Integration (CAI)](https://knowledge.informatica.com/s/article/DOC-17653?language=en_US)).
@@ -49,7 +49,7 @@ Some areas of the Success Portal link out to [Informatica Network](https://netwo
## Secure Agents for Training
During some trainings, there might be mentions of setting up your own secure agent or accessing a secure agent directly.
During some trainings, there might be mentions of setting up your own secure agent or accessing a secure agent directly. Information on Secure Agents and their usage can be found in [This Documentation](../best-practices/secure-agent.md).
If one is using their own trial organization for training purposes, secure agents can be created using [These Instructions](./docker-secure-agent.md).
[AIS/EI maintains a Docker image](https://git.doit.wisc.edu/interop/iics/iics_secure_agent/blob/master/README.md#iics-secure-agent-docker-image) that can be used for your own Secure Agent deployments.
See also Informatica [documentation](https://docs.informatica.com/integration-cloud/cloud-platform/current-version/runtime-environments/runtime-environments/secure-agents.html) on Secure Agents.
## How to create a Manifest group for your team for access control?
DoIT EI uses Manifest groups to give teams access to the UW-Madison IICS environment. Please view the documentation on [Provisioning and Managing Manifest Users](manifest-users.md).
## How to access two IICS Orgs/Environments at the same time?
It is not possible to access multiple IICS Orgs/Environments in a single browser session as login information is cached during the session. The following methods can be used if you require access to multiple Orgs/Environments:
1.**Use multiple browsers**: Login to one Org/Environment in one browser (eg. Google Chrome), and use another browser (eg. Firefox) to login to another Org/Environment.
1.**Private/Incognito mode**: Login to one Org/Environment in your normal browser window, and use a private/incognito browser window to login to another Org/Environment.
[HOW TO: Use two IICS ORGs / Environments at same time](https://kb.informatica.com/howto/6/Pages/23/583317.aspx)