Yep! Fundamentally, this is about the effects of loosely-coupling Identity, Identification, Authentication, Authorization, and Storage.