Configure user access

You can manage user access by applying additional encryption to passwords, setting basic authentication, and defining role-based access.