Introduction to Authorization (5m)

Once users are authenticated, they are then authorized to access various assets. These assets include databases, connection services, system functions, and user applications. Resources and roles are then assigned to assets and users for authorization.


The next video presents resources and roles.

Última modificación: viernes, 26 de mayo de 2023, 14:27