This graphic shows the basic model for authorization checking at runtime.