Summary
By now, you should have a clear understanding of how to externalize the functions of your applications and centralize them for common use by all other applications in your information system. We went into much detail concerning IAM, because this is such an important function for security. We then proceeded to externalize persistence, which is something everybody generally does since database engines are such sophisticated and complex pieces of software. We went back to something that is not externalized so much, even though doing so brings so much value, namely the EDM system. There, we went into a little less detail.
If you really got this chapter and see how much benefit it can bring you, you should be ready to externalize some more. Do so! Remember that everything that is not your core business will be much better done by external specialists, in a more robust and secure way. Most of the time, you will even find a nice open-source alternative so there really is no need...