Create and organize protected resources, then define which scopes can be requested for each one.
Review incoming access requests and approve or deny permissions for shared resources.
See which applications can access your data and revoke consents you no longer trust.