« Four types of clouds | Main | Three types of application identity interactions »