The component accomplishes main tasks in building a security scheme for your application. It performs authentification and authorization of users: controls access of certain users to some system objects.
The core advantages
z Reducing of development costs by using third-party software.
z The component can be integrated with an application on any phase of the project.
z Security scheme is easy to change; you don't have to modify the source...