Figure 2.
Flow of authentication logic and user accounts used in Default authentication.