. . "Each application runs under a separate identity which restricts access to resources such as files and databases." . . .