Figure showing the end-to-end request flow for authenticating a user accessing an OAM protected resource.