This section describes the security data model in detail. For information on how to configure the core model, see How to Configure the Security Model.
For a high-level overview of the security and encryption methodology used by Hexagon, see How does Hexagon manage system security?