-
Easily configured without privileged access to the machine
-
Changed on a per-application basis, if necessary
-
Managed automatically by install processes
-
Configured manually, without every having network access to the resources
managed
-
Extended by resolvers