Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Implementing Access Control in RAG Applications for Private Data Security

Okta via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement Retrieval Augmented Generation (RAG) with proper access control in this 10-minute developer tutorial. Explore the challenges of handling confidential data in RAG applications and discover practical solutions through hands-on coding examples. Follow along as Developer Advocate Jess Temporal demonstrates building a RAG application with access control features, covering essential topics like Okta FGA model setup, client configuration, relationship tuple creation, and secure RAG querying. Access accompanying resources including a detailed blog post and code samples to implement secure RAG systems that protect sensitive information while leveraging the power of Large Language Models.

Syllabus

00:00 Introduction
00:37 Private Data and RAGs and LLMs
01:31 Example Case
02:15 Sample App
02:57 Okta FGA model setup
04:41 Okta FGA client setup
05:55 Creating first relationship tuple
07:15 Querying using RAG
08:59 Tuple Creation in the Dashboard
09:45 Closing

Taught by

Okta

Reviews

Start your review of Implementing Access Control in RAG Applications for Private Data Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.