This illustration shows two identity management realms. In the first, employees access Applications A, B, and C. In the second, external users access Applications C and D.