umar adams

15%
Flag icon
This is the authorization layer. What data are users authorized to access, download, forward, copy, export, change, add, update, preview, edit, print, upload, share, delete, create, and so on? What entitlements or settings can users modify? What groups and distribution lists can they join, view, edit, delete, or share? That’s where the concept of user interactions come in.
The IT Leader's Guide to SaaSOps (Volume 2): How to Secure Your SaaS Applications
Rate this book
Clear rating
Open Preview