While reading the previous chapter, you probably asked yourself questions about the security of AWX.
AWX is very powerful and, to be so powerful, it needs a lot of access to target machines, which means that it can become a potentially weak link in the security chain.
In this chapter, we are going to discuss a little bit about AWX users, permissions, and organizations; namely, we are going to cover the following topics:
- AWX users and permissions
- AWX organizations