diff --git a/README.md b/README.md index d8180131c2e112dcac9df9427c6dc8c5bd909bdf..52eb6bab5fd8995f1c3865b05dea5a14b3bbbfc9 100644 --- a/README.md +++ b/README.md @@ -11,7 +11,7 @@ * [Logging in](./docs/logging-in.md) * [Training](./docs/training/training.md) * [Best Practices And Recommendations](./docs/best-practices/) -* [Integration Tutorials](./docs/tutorials.md) +* [Integration Tutorials](./docs/tutorials/README.md) * [Secure Agents](./docs/secure-agent.md) * [Shared Orgs and Sub Orgs](./docs/shared-org-vs-sub-org.md) * [Get Help](./get-help.md) diff --git a/docs/best-practices/shared-environment.md b/docs/best-practices/shared-environment.md index 9320b76c839e842fba3414cc7b272c3b71abda89..0df982a200a2158ca338cb674f749429b60139db 100644 --- a/docs/best-practices/shared-environment.md +++ b/docs/best-practices/shared-environment.md @@ -6,7 +6,7 @@ This means that you might see other objects in IICS, such as projects, connectio ## Use User Groups to Control Access When you create a new project, make sure you edit the permissions to limit who can view and change the assets within the project. -**If no permissions are configured on a project or the assets within it, anybody who has access to IICS will be able to view, change, run, and delete the contents of the project.** +**If no permissions are configured on a project or the assets within it, anybody who has access to IICS will be able to view, change, run, and delete the contents of the project. If ONE specified user has permissions on the project or asset, NO OTHER PERSON can view, change, run or delete the contents.** Use the group that was sent when you were granted access to IICS to control who can access the contents of the project. 1. Right-click on a project folder and click "Permissions..."  diff --git a/docs/on-boarding-to-iics.md b/docs/on-boarding-to-iics.md index 24ea4ae57a7716aabadaa1e3af9b6725011c0135..aaf7b5e49ae467ec49d48e5c0e2be9b62566d188 100644 --- a/docs/on-boarding-to-iics.md +++ b/docs/on-boarding-to-iics.md @@ -17,6 +17,6 @@ Access to IICS is controlled through Manifest. Please refer to [This Documentati ## Next Steps -After getting access to IICS, you can [Log In to IICS](./logging-in.md), begin your [Informatica Training](./training/training.md), follow [Integration Tutorials](./tutorials.md), and start implementing your integration(s). +After getting access to IICS, you can [Log In to IICS](./logging-in.md), begin your [Informatica Training](./training/training.md), follow [Integration Tutorials](./tutorials/README.md), and start implementing your integration(s). Our team will work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case. Informatica also provides documentation to get started (e.g. [getting started guide for Cloud Application Integration (CAI)](https://knowledge.informatica.com/s/article/DOC-17653?language=en_US)). diff --git a/docs/tutorials.md b/docs/tutorials/README.md similarity index 100% rename from docs/tutorials.md rename to docs/tutorials/README.md