In this chapter, we learned about the capabilities of the security model in the CDS, primarily business units and security roles. We also discussed alternative security approaches with teams, field security, and hierarchies.
We covered how to add a user and then apply security features to the user to ensure they have access to the necessary data and functionalities to do their job.
You will now be able to identify the appropriate security features to meet your requirements, and then be able to configure environments and security settings as needed.
In the next chapter, we will introduce model-driven apps and how to build them, and in doing so we will compare them with canvas apps.