This is provided using SSL. See SSL in the cluster.
User credentials are provided both directly in the cluster configuration or by integrating with an Active Directory installation.
See User Authentication.
Roles define what data the user can see and what actions they can perform. They can be assigned to a user directly or by integrating with existing Active Directory groups for that user.
See Data Permissions.