. . "Merely by way of example, such trust information can include, without limitation, the information described above, such as credentials, identifiers, password verifiers, etc. associated with one or more services, as well as application-specific requirements, abilities, configurations, etc." . . .