Introduction to Authorization (5m)

Once users are authenticated, they are then authorized to access various assets. These assets include databases, connection services, system functions, and user applications. Resources and roles are then assigned to assets and users for authorization.


The next video presents resources and roles.

最後修改: 2023年 05月 26日(週五) 14:27