Skip to main content
Previous sectionNext section

Recap

In the Securing Applications section of this tutorial you have learned about the following:

  • Creating and editing application definitions for CSP (and Zen) applications as well as privileged routine applications.

  • Protecting applications using resources.

  • Implementing role escalation in CSP and privileged routine applications.

Note:

Click here to return to the Preface.

Click here to return to Part I (Authentication).

Click here to return to Part II (Authorization).

Click here to return to Part III (Applications).