The infrastructure diagram shows us that the devices use all the power of our platform to perform their security validations hosted on an application server accompanied by its database to store all the configurations made and then, depending on the application that we want to enter , sends users to the servers of the corresponding applications.