This page demonstrates a secure IAM design using proper authentication, role-based access control, input validation, and audited actions.
Welcome! Your role determines what actions you can perform.
This determines which UI elements appear and which actions are allowed.