Introduction to Authorization (5m)

Once users are authenticated, they are then authorized to access various assets. These assets include databases, connection services, system functions, and user applications. Resources and roles are then assigned to assets and users for authorization.


The next video presents resources and roles.

Modifié le: vendredi 26 mai 2023, 14:27