This visual execution shows how Jenkins authenticates users using LDAP or SAML. When a user logs in, Jenkins captures credentials and selects the authentication method. For LDAP, Jenkins sends a query to the LDAP server to retrieve user info and validate the password. If successful, access is granted. For SAML, Jenkins redirects the user to an external Identity Provider where the user logs in. The IdP sends back a SAML token, which Jenkins validates before granting access. Variables like credentials, authentication method, user info, and access status change step-by-step during the process. Key points include the difference in where credentials are entered and how validation happens. The quizzes test understanding of these steps and variable changes.