Diagram of security identity propagation from client to intermediate container to target container