Figure illustrating the authentication flow when a user requests a protected resource. The surround text describes the flow.