At this point, the security service has authenticated the user's identity (that is, has verified that the user knows its password), and the user has acquired (trusted) information about its privilege attributes from the privilege service. The client now calls sec_login_set_context( ) to set the login context (a handle to this user's network identity and privilege attributes that have been established). Henceforth, processes invoked by this user inherit the user's login context, and among these processes is the client side of distributed applications - those are the subject of the rest of the walkthrough.