┌───────────────┐ ┌───────────────┐ ┌───────────────┐
│ Identity │──────▶│ Authentication│──────▶│ Authorization │
│ Management │ │ (Proof Check) │ │ (Access Rules)│
└───────────────┘ └───────────────┘ └───────────────┘
│ │ │
▼ ▼ ▼
┌───────────────┐ ┌───────────────┐ ┌───────────────┐
│ Access Policies│ │ Role-Based │ │ Multi-Factor │
│ (Permissions) │ │ Access Control│ │ Authentication│
└───────────────┘ └───────────────┘ └───────────────┘This diagram shows the flow from identity management through authentication and authorization, supported by access policies, role-based access control, and multi-factor authentication.