This graphic shows the perimeter authentication process. Perimeter authentication requires the same components as the authentication process, but also adds an Identity Assertion provider.