This content is currently WIP. Diagrams, content, and structure are subject to change.
This section covers the ways that developers can protect their data and control which users are allowed to interact with certain parts of applications.