We can trace “what was asked and when, which sources were used, what output was produced, and whether it was approved/executed”. User identity mapping (“who asked”) must rely on customer SSO/IAM (agreement/config govern).
We can trace “what was asked and when, which sources were used, what output was produced, and whether it was approved/executed”. User identity mapping (“who asked”) must rely on customer SSO/IAM (agreement/config govern).