The figure illustrates a pass-through authentication model