Control authentication and authorization of user roles and permissions for all
applications and API-based access. Through Identity & Access, you can manage:
Generate authorization tokens for virtual ION devices. This provides a set of
controls to prevent unauthorized addition of virtual devices to an environment.