Users make mistakes. It behooves us as stewards of a user’s data to ensure compromise does not occur, but at the same time ensure that if the user does what humans do and makes a mistake that they are able to recover gracefully.
The final article in this Non-Human Identity series explores how NHIs interact with systems. It focusses on access, permissions, and the dual nature of “access to” and “access by.”