-
Learn about the symbols for notes, tips, and warnings in the Resolver Security Risk Management User's Guide.
-
Learn more about the Resolver Security Risk Management User's Guide.
-
Learn about the intended audience of the Security Risk Management User's Guide.
-
Find out where your Resolver Security Risk Management data is stored.
-
More information about the Edit Form Template option, which allows admins to quickly access a form's settings.
-
An overview of Resolver's Security Risk Management application.
-
How to update a policy as a member of the Policy Owners user group.
-
-
To maintain the current session: From Swagger, scroll down to the authenticate endpoint. Click GET /user/authenticate (Renew token) . Enter the bearer token that's about to expire in the authorization header. Click Try it out! to return a ...
-
API keys can be used to authenticate requests in Core while impersonating another user; however, note the following: Impersonation can only be enabled by a member of Resolver Support at the time the key was created. Should you wish to enable impe...