Section 3.1, Security: Best Practices
Section 3.2, Solving Identity Issues
Section 3.3, How to Use Designer