Control access and enforce security policies Provide system with required data. Handle all the communications between the client and the target application. Utilize many security features such as authentication where: dentities are verified. Credentials are handled. Messages are protected from unauthorized modifications and disclosure Access control policies are managed and audited for accountability. Apply shared