Summary
In this chapter, we learned that there are a rich set of administrative features for securing the instance along with the cultural and organizational considerations that impact how to establish a security policy. Under governance, we discussed how to manage people, groups, roles, trusted attributes, activity logs, and licenses. For the content section, we reviewed the cards, pages, and scheduled reports administration features. Regarding authentication, we learned about Domo's authentication and how to use third-party authentication services for SSO. Additionally, we discussed multi-factor authentication and access tokens. The network security section covered domain and IP address whitelisting. And we went through many features around company settings, Domo Everywhere, tool downloads, and more. All of these features enable us to tailor our security policy implementation to fit our specific cultures and organizations. A number of options for safely and securely handling...