Construct vs. acquire: Roll your own auth vs. a pre-crafted identification layer Some areas of this post are sourced from: www.itpro.co.uk