Security

Authentication and session protection.

Identity verification

Workspace entry requires account verification before routes and inventory are exposed.

Step-up controls

Organizations may require second-factor verification for sensitive routes and device actions.

Session boundaries

Authenticated views are scoped by tenant policy and session approval state.