Figure 3

Figure 3: The authentication flow.