The figure shows an example of how the three types of credential vaults work together as described in this section.