For details about the provided execs, see Table 6-1, Identity Vault Command Processing Execs; Table 6-2, Other Execs; and the execs themselves.
For details about the connected system schema file, see Section 6.2, The Connected System Schema File.
For details about the driver shim configuration file, see Section 5.2, The Driver Shim Configuration File.
For details about the include/exclude file, see Section 6.3, The Connected System Include/Exclude File.
For details about customizing policies, see the Policy Builder and Driver Customization Guide on the Identity Manager 3 Documentation Web site.