The figure illustrates a pass-through authentication configuration model