IntentCenter

Source E — security and governance

Authentication and roles

Inherited from iTop user accounts, profiles, and organizations—centralized directory integration depends on iTop configuration.

Audit

iTop’s history and audit features apply to TeemIp objects when enabled—operator-visible trails for compliance.

Secrets

Credential handling follows iTop/PHP deployment practices; contrast with Source A’s Secrets and Secrets Groups abstraction.