This lesson discusses how to integrate user and group authorization through authentication databases to regulate access to applications.

Please login.