Step 3 - Security Administration

Chapter 5. Summary

OK, Sonatype CLM is now installed, configured, and secured to your specifications. With those out of the way, we can start learning how Sonatype CLM enables your business to improve visibility of risky component usage. This starts with understand two core concepts, Organizations and Applications. We’ll be discussing those in Step 4 - Policy Guide.