pros - aggregate all configuration in one service for better management. - improves the security model by not sharing secrets. - adds support for the management center. cons - adds an additional attack vector. - requires clients to retrieve configuration.