Figure 5-1

For a step-by-step description of the authentication flow in third-party Single Sign-On, see the text immediately following the graphic.