Referring back to flowchart 1100, in step 1110, a token is received responsive to providing to the token request. For example, application 1008 may receive a token generated by the identity policy host responsive to the token request being provided. In embodiments, the token may be received via network interface 1022 and/or communicator 1010. Application 1008 may be configured to provide the received token to identity claim and token manager 1020 for consumption thereof.
In step 1112, the token is consumed by the application to allow access by the user to at least one feature of the application. For instance, identity claim and token manager 1020 of application 1008 may be configured to consume the token. The token may be generated by the identity policy host according to the identity policy specified in the call in step 1108 and may include all claims, as verified, required by application 1008 to authenticate the user and allow access by the user to feature(s) of the application.