Security is considered throughout the solution and involves a number of elements on top of the Microsoft Azure cloud infrastructure. For users accessing the solution, authentication is required against Microsoft Azure Active Directory. Network access is secured through the https protocol so that all network traffic is encrypted. In addition, it is possible to limit access by network endpoint address.
User access to data and application functions are restricted. Data access is restricted by mapping user roles to dimension data such as a set of departments. Likewise access to applications is restricted by user roles which are granted access to certain application parts.