All right, so we've identified. We've proven our identity
with multi factor authentication, right, because that's really what we need
next. Things to get authorized. What can I do? So this just a little illustration that individual users are authorized, perhaps based on their role within the organization, perhaps based on their region, perhaps based on any other set of potentials,
but they're authorized to access. Certain resource is,
I'll tell you, from again attesting standpoint, we 10 until they like this idea of access control. That's role based, role based access control and you'll see that is our back. And the reason for that is if you have permissions and rights associated with your role
and you moved to a new roll, those permissions and rights are following you,
right? So we we really reduce the issues with privilege creep,
and we have a more consistent set of rights and permissions. It makes account reviews easier, so we tend to like dealing with this from a role based, access control type environment
into one of many ways. You know, discretionary access control comes to us, you'll see it in the window's environment,
and that's just based on okay, you create an account that's your identity, and I'll sign whatever rolls and permissions you want.
So roll based access control has a stronger degree of administrative control. It's a more secure environment.