Summary
In this chapter, you learned how to secure our dashboard as an object by applying the proper access levels to the corresponding users. You also learned how to control and assign dashboard application privileges. After that, you learned how to secure our data by applying row level security. Finally, we discussed the best practices that we need to consider while designing our security model for our dashboards.
In the next chapter, you will learn how to create mobile dashboards and how to identify mobile supported components. Also, you will learn some tricks and tips on how to overcome unsupported mobile components.