The text preceding this figure describes the two daemons, the authentication, authorization, and the connections to Connection Manager shown on this figure.