Need to Know: Control Who Sees What in Your LIMS
January 23, 2023
Laboratory information security is not merely a question of who can access your systems. What you allow people to access once they are in matters just as much. In a previous blog post, we discussed the first pillar of access control: authentication, or the process of verifying user identity. In this post, we will discuss the second pillar, authorization, and…