Because the eTrust IAM Toolkit allows developers to leverage existing security infrastructure, they can implement and enforce rules based on business logic -- using resource and user attributes defined in centralized user stores and other enterprise systems, such as HR and ERP -- rather than writing application-specific code.