The image shows an extend client that connects to a cluster proxy. The TCP Initiator on the extend client contains an identity transformer implementation that sends an identity token to the TCP Acceptor on the proxy that contains an identity asserter implementation that validates the token.