Identity and Access Odyssey
Building a secure system to protect the data starts with the first steps of Authentication & Authorization, identifying how valid users are able to find, reach and access the system. There are many ways to control this access and it can include more than just Salesforce. There are multiple mechanisms to choose from, and it is the Architect’s job to understand them and make the best choice.
Related Videos
You may also like some of these other video series that I’ve put together.