In this chapter, we explored WCF, WCF bindings, and WCF security. We have also designed our security database and created a RESTful service on top of the database we created. Now that our RESTful service has been created, we will explore how we can consume this service in the next chapter.