Date: Mon, 07 Dec 2020 00:00:00 -0800
When we think about accounts and security, we often think about identity (logging in and proving who you are). But for many applications, especially internal apps at large organizations, that's just step one. The next step is what can you do and what can you not do.