By integrating present authentication and authorization mechanisms, applications can securely access info and execute functions devoid of escalating the assault surface. constrained threat: has minimal possible for manipulation. really should comply with nominal transparency needs to buyers that may allow consumers for making educated conclusions.