- Cloud Security Automation
- Prashant Priyam
- 50字
- 2025-02-19 17:53:09
Authorization
Once the user is authenticated, there must be some authority defined for the user to access the data so that he can perform the required action. Basically, here we define the access policies and roles for users. Users with read permission should not be able to modify the data.