Authentication flows

The following diagrams illustrate user authentication and authorization using several authentication methods.

For simplicity, peripheral network components, such as the load balancer or application gateway, are not included in the diagram, but it is assumed that every connection to the internal network servers is done through these devices.