- Control access and enforce security policies
- Provide system with required data.
- Handle all the communications between
- the client and the target application.
- Utilize many security features such as authentication where:
- dentities are verified.
- Credentials are handled.
- Messages are protected from unauthorized
- modifications and disclosure
- Access control policies are managed and audited for accountability.
- Apply shared data security and integrity.
- Secure one-to-one and group communication.
- Secure mobility management