Adding the security bits to our Contoso use case
In this section, we will review our Contoso use case that we started in Chapter 2, Solution Architecture, and improved in Chapter 5, Application Architecture. However, none of our diagrams included security-specific portions. It is time to fix this and see where to use some of the features that we have explained throughout this chapter. Figure 7.20 illustrates what we ended up with in Chapter 5, Application Architecture:
As you can see, there is nothing specific about security. For the sake of simplicity and brevity, we will get rid of the Power BI and Stream Analytics services. So, our new functional flow is now as shown in Figure 7.21:
For the security bits, we are interested in the interactions between the components, to understand...