Summary

Completed

In this module, you learned how to:

  • Identify the three types of shared access signatures
  • Explain when to implement shared access signatures
  • Create a stored access policy