Validating the security credentials
The database is usually a commonly used, highly optimized piece of software written by somebody else, whereas servers are very often custom software that is written by you specifically for the clients' needs In this example, the server talks to the clients.If the database would talk directly to the clients it generally makes your system extremely insecure because the client (and therefore your users) has access to all your data.
This means that by default the “attempts” feature is disabled. The Maven project contains an implementation of Credentials Validation Security Check.
to verify who you are and whether you have permission to access the resources that you are requesting.
AWS uses the security credentials to authenticate and authorize your requests.
class is meant for simple flows to validate arbitrary credentials in order to grant access to a resource.
Also provided is a built-in capability to block access after a set number of attempts.
The client talks to the server as you are interacting with google, the server sends you back suggestions and eventually gives you the answer to your question, but you as a client don't need access to all information in google, only google's servers should have access to all this information, and should only show you what you need to know.