No.
Related Articles
How is the tenant service ensured?
How is authentication and authorization accomplished?
Multi-tenant architecture: What does it mean?
How is vulnerability, patch, and security updates management ensured?
Are connections to other systems necessary? If yes, which systems and using which protocols?
