Description of the illustration id_assert_process.gif

This graphic shows the perimeter authentication process. Perimeter authentication requires the same components as the authentication process, but also adds an Identity Assertion provider.