This section describes how Access Manager uses policies to assign roles, to control access, and to enable single sign-on to resources that require credentials.
Section 26.0, Managing Policies
Section 27.0, Creating Role Policies
Section 28.0, Creating Authorization Policies
Section 29.0, Creating Identity Injection Policies
Section 30.0, Creating Form Fill Policies