Hey I was thinking what would be you thoughts about managing Zero Trust Applications too? Creating/Assigning access policies? Would you consider a PR?