This image illustrates how ADF security is implemented and explains the implicit authentication process when a user tries to access the ADF components without logging in.