Figure 4.
Flow of authentication logic and user accounts used in Windows.