Putting it all together This section shows how to enable all available defenses.

This example uses SSL encryption, NATIVE authentication, and both coarse-grained and fine-grained authorization.