• Configuring application-based policies and user identification settings for access control.