Figure shows the flow of information when a proxy authorization control is contained in a client request.