The figure illustrates pass-through authentication mechanism