Conclusion

A guide like this can't proscribe the correct solution for every scenario. This chapter simply aims to raise awareness of all the options for storing usernames and credentials and making them accessible to RTC processes. System administrators and developers will need to consider the infrastructure that is already present when deciding which of these options are most relevant for a given site.