Step 2. Choose a data sourceUse a storage assetor Choose a data block Request access to restricted data
Step 3. Choose processing algorithmsUse a custom blockor Choose processing blocks Request access to restricted data