This figure illustrates an environment in which you can audit the client identifier of a user. From left to right, top to bottom, top to bottom, are the following components: