Skip to content
Snippets Groups Projects
Commit 631669ee authored by SAM CARPENTER's avatar SAM CARPENTER
Browse files

Update README.md, docs/on-boarding-to-iics.md, docs/training/training.md

Deleted howto.md
parent 33e8f86d
Branches master
No related tags found
1 merge request!45External Doc Reorganization
......@@ -42,8 +42,8 @@ Use [template.md](./template.md) to create new content.
## Contents
* [On-Boarding to IICS](./docs/on-boarding-to-iics.md)
* [Logging in](./docs/logging-in.md)
* [Tutorials](./docs/tutorials.md)
* [Training](./docs/training/training.md)
* [Best Practices And Recommendations](./docs/best-practices.md)
* [Tutorials](./docs/tutorials.md)
* [Shared Orgs and Sub Orgs](./docs/shared-org-vs-sub-org.md)
* [Get Help](./get-help.md)
......@@ -11,12 +11,12 @@ In order to get access to Informatica Intelligent Cloud Services (IICS), please
Someone will get back to you within 3 business days with next steps, including instructions to get access.
Depending on your use case, we might schedule a meeting to discuss your use case further and decide on next steps.
## Next Steps
## Access Control
Access to IICS is controlled through Manifest. Please refer to [This Documentation](./manifest-users.md) for more information.
The Integration Platform team will work with you to give you access to IICS.
Access is controlled through Manifest.
See [this document](./howto.md#how-to-create-a-manifest-group-for-your-team-for-access-control) for more information.
We will also work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case.
## Next Steps
After getting access to IICS, you can start [training](./training/training.md), follow [tutorials](./tutorials.md), and start implementing your integration(s).
Our team will work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case.
Informatica also provides documentation to get started (e.g. [getting started guide for Cloud Application Integration (CAI)](https://knowledge.informatica.com/s/article/DOC-17653?language=en_US)).
......@@ -49,7 +49,7 @@ Some areas of the Success Portal link out to [Informatica Network](https://netwo
## Secure Agents for Training
During some trainings, there might be mentions of setting up your own secure agent or accessing a secure agent directly.
During some trainings, there might be mentions of setting up your own secure agent or accessing a secure agent directly. Information on Secure Agents and their usage can be found in [This Documentation](../best-practices/secure-agent.md).
If one is using their own trial organization for training purposes, secure agents can be created using [These Instructions](./docker-secure-agent.md).
......
# How To Guides
- [How to migrate IICS assets from `test` to `prod`?](#how-to-migrate-iics-assets-from-test-to-prod-)
- [How to increase memory allocated for Secure Agent?](#how-to-increase-memory-allocated-for-secure-agent-)
- [How can I deploy my own Secure Agent?](#how-can-i-deploy-my-own-secure-agent-)
- [How to create a Manifest group for your team for access control?](#how-to-create-a-manifest-group-for-your-team-for-access-control)
- [How to access two IICS Orgs/Environments at the same time?](#how-to-access-two-iics-orgsenvironments-at-the-same-time)
## How to migrate IICS assets from `test` to `prod` ?
[how-to-migrate]: #how-to-migrate-iics-assets-from-test-to-prod-
Use the process documented [here](https://git.doit.wisc.edu/interop/iics/iics-assets/blob/master/README.md)
([reach out](../README.md) to us if you would like to access it).
## How to increase memory allocated for Secure Agent ?
[how-to-increase-mem]: #how-to-increase-memory-allocated-for-secure-agent-
Java heap size can be increased according to the [KB](https://kb.informatica.com/howto/6/Pages/17/336913.aspx) document from Informatica.
## How can I deploy my own Secure Agent ?
[which-firewall]: #how-can-i-deploy-my-own-secure-agent-
[AIS/EI maintains a Docker image](https://git.doit.wisc.edu/interop/iics/iics_secure_agent/blob/master/README.md#iics-secure-agent-docker-image) that can be used for your own Secure Agent deployments.
See also Informatica [documentation](https://docs.informatica.com/integration-cloud/cloud-platform/current-version/runtime-environments/runtime-environments/secure-agents.html) on Secure Agents.
## How to create a Manifest group for your team for access control?
[manifest-group]: #how-to-create-a-manifest-group-for-your-team-for-access-control
DoIT EI uses Manifest groups to give teams access to the UW-Madison IICS environment. Please view the documentation on [Provisioning and Managing Manifest Users](manifest-users.md).
## How to access two IICS Orgs/Environments at the same time?
[access-multiple-envs]: #how-to-access-two-iics-orgsenvironments-at-the-same-time
It is not possible to access multiple IICS Orgs/Environments in a single browser session as login information is cached during the session. The following methods can be used if you require access to multiple Orgs/Environments:
1. **Use multiple browsers**: Login to one Org/Environment in one browser (eg. Google Chrome), and use another browser (eg. Firefox) to login to another Org/Environment.
1. **Private/Incognito mode**: Login to one Org/Environment in your normal browser window, and use a private/incognito browser window to login to another Org/Environment.
[HOW TO: Use two IICS ORGs / Environments at same time](https://kb.informatica.com/howto/6/Pages/23/583317.aspx)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment