Software Secure Workload
Activity Configure

Prerequisites

  • Security tokens (access key and secret key) used should have the right kind of IAM privileges to allow fetching of orchestrator information.