Description
This sessions focuses on some typically overlooked, bits and pieces of configurations which Identity Security Cloud architects and developers typically miss out on, which ends up making their lives much harder. We will discuss hidden tricks and techniques you can leverage to create an amazing security compliant IAM system with ISC.