What is claimed is:1. A system for authorizing access by a remote principal of a second domain to a secure data resource of a first domain of a domain host, the system comprising:a processing system that includes one or more processors; andat least one memory that stores program code to be executed by the processing system to perform a method, the method comprising:verifying that the remote principal is identified as being associated with a group of the second domain represented in a remote principal object stored in a directory of the first domain at the domain host and inaccessible from the second domain, the group having at least one entitlement to the secure data resource as enumerated in a set of permissions and at least one associated access policy defined by the second domain;generating an access token for the remote principal that includes the at least one entitlement; andproviding the access token to the remote principal to enable access to the secure data resource by the remote principal.2. The system of claim 1, wherein the method further comprises:causing generation of the remote principal object in the directory of the first domain prior to said verifying.3. The system of claim 2, wherein said causing generation of the remote principal object is performed based on an acceptance within the first domain of an access permission approval request for the secure data resource that is initiated in and provided on behalf of the second domain.4. The system of claim 2, wherein said causing generation of the remote principal object includes determining a temporal validity period associated therewith; andwherein the method further comprises performing at the domain host, and subsequent to an expiration of the temporal validity period, at least one of:removing the remote principal object from the directory; orremoving the set of permissions and the at least one associated access policy from the directory.5. The system of claim 1, wherein the method further comprises:generating, subsequent to said providing the access token, an audit report including at least one of:one or more entries for operations performed by the remote principal on the secure data resource, orindicia of the set of permissions with which the remote principal object is associated.6. The system of claim 1, further comprising:a cloud-based services platform that includes a secure token service configured to generate the access token;wherein the domain host comprises a first tenancy of the cloud-based services platform, and the second domain comprises a second tenancy of the cloud-based services platform.7. The system of claim 1, wherein the method comprises:verifying that an entry of an identity of the remote principal is absent from the directory in the first domain and is present in a directory of the second domain.8. A method for authorizing access by a remote principal of a second domain to a secure data resource of a first domain of a domain host, the method comprising:verifying, by a processing system that includes a processor, that the remote principal is identified as being associated with a group of the second domain represented in a remote principal object stored in a directory of the first domain at the domain host and inaccessible from the second domain, the group having at least one entitlement to the secure data resource as enumerated in a set of permissions and at least one associated access policy defined by the second domain;generating, by the processing system, an access token for the remote principal that includes the at least one entitlement; andproviding, by the processing system, the access token to the remote principal to enable access to the secure data resource by the remote principal.9. The method of claim 8, wherein the method comprises:causing generation of the remote principal object in the directory of the first domain prior to said verifying.10. The method of claim 9, wherein said causing generation of the remote principal object is performed based on an acceptance within the first domain of an access permission approval request for the secure data resource that is initiated in and provided on behalf of the second domain.11. The method of claim 9, wherein said causing generation of the remote principal object includes determining a temporal validity period associated therewith; andwherein the method comprises performing at the domain host, and subsequent to an expiration of the temporal validity period, at least one of:removing the remote principal object from the directory; orremoving the set of permissions and the at least one associated access policy from the directory.12. The method of claim 8, wherein the method comprises:generating, subsequent to said providing the access token, an audit report including at least one of:one or more entries for operations performed by the remote principal on the secure data resource, orindicia of the set of permissions with which the remote principal object is associated.13. The method of claim 8, wherein said generating the access token is performed at a cloud-based services platform by a secure token service thereof; andwherein the domain host comprises a first tenancy of the cloud-based services platform, and the second domain comprises a second tenancy of the cloud-based services platform.14. The method of claim 8, wherein the method comprises:identifying one or more remote principal objects in the directory of the first domain that are associated with the second domain; anddetermining at least one of the one or more remote principal objects as having a group attribute; andwherein the remote principal object is included in the at least one of the one or more remote principal objects, andwherein said verifying includes determining that the remote principal is identified as a member of the group as represented in the remote principal object.15. At least one computer-readable storage medium that stores program instructions that, when executed by one or more processing devices, performs a method for authorizing access by a remote principal of a second domain to a secure data resource of a first domain of a domain host, the method comprising:verifying that the remote principal is identified as being associated with a group of the second domain represented in a remote principal object stored in a directory of the first domain at the domain host and inaccessible from the second domain, the group having at least one entitlement to the secure data resource as enumerated in a set of permissions and at least one associated access policy defined by the second domain;generating an access token for the remote principal that includes the at least one entitlement; andproviding the access token to the remote principal to enable access to the secure data resource by the remote principal.16. The at least one computer-readable storage medium of claim 15, wherein the method comprises:causing generation of the remote principal object in the directory of the first domain prior to said verifying.17. The at least one computer-readable storage medium of claim 16, wherein said causing generation of the remote principal object is performed based on an acceptance within the first domain of an access permission approval request for the secure data resource that is initiated in and provided on behalf of the second domain.18. The at least one computer-readable storage medium of claim 16, wherein said causing generation of the remote principal object includes determining a temporal validity period associated therewith; andwherein the method comprises performing at the domain host, and subsequent to an expiration of the temporal validity period, at least one of:removing the remote principal object from the directory; orremoving the set of permissions and the at least one associated access policy from the directory.19. The at least one computer-readable storage medium of claim 15, wherein said verifying includes determining that the remote principal is also associated with another remote principal object; andwherein said generating the access token for the remote principal that includes the at least one entitlement comprises generating the access token for the remote principal as also including one or more entitlements to another secure data resource associated with the other remote principal object.20. The at least one computer-readable storage medium of claim 15, wherein the access token includes an identifier of the remote principal object and does not include a personal identifier of the remote principal.