Data flow overview

Operational data moves through predictable, auditable stages from ingress to analytics.

  1. User action or authorized device event enters module API.
  2. Session context resolves tenant, role, and edition entitlements.
  3. License + RBAC guards validate the mutation path.
  4. Validated records persist with scoped audit log entries.
  5. Reporting, exports, and dashboards consume normalized tenant data.
Tenant isolation is enforced at every stage. No cross-tenant data paths are allowed in default operation.