Authorized users sign-in via third party authentication, e.g. Google single sign on. Only the user ID is utilized by the application. Access and operations are logged, however no personal information other than the ID is fetched or retained or utilized in any manner othen than the intended purpose of controlling access to tools on this domain.