The configuration that is applied for anonymous connections
The system principals stored on the server.
The map of trusted client proposed properties, where the key is the permitted property name and the value defines the validation applied to the property.
A snapshot of information from the system authentication store.