3 Implementing Token Proxy Service Security