Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
After completing this module, you should be able to:
Identify the record types used to configure role-based access control.
Customize access roles based on dependent roles.
Identify the role of attachment categories.
Distinguish between attribute-based and role-based access control.
Identify the role of access control policies and access control policy conditions in securing an application.
Identify the role of a client-based access rule in securing an application.
Practice what you learned in the following Challenges:
Securing an application using attribute-based access control
Using RBAC to organize and manage access to case attachments
Available in the following mission:
Senior System Architect