Conclusion
In this chapter, I’ve aimed to point out the different types of integrations that we may have to work with during a project. And I hope I’ve pointed out some potential issues that could pop up during a project and how to fix them or prevent them from even happening. If you get this part of the project right, you’ll look like a hero later on when users don’t ever notice that they aren’t working with data all in one single system.
In the next chapter, we will take a look at designing and setting up a security configuration. We will look at out-of-the-box versus custom security roles, table-level security, separation of duties, and how to properly set up access for external users. We will also look at examples of how to correctly set up security.