Figure shows the flow of information when a client request does not contain a proxy authorization control.