Figure 3.
Flow of authentication logic and user accounts used in Windows.