Identity and Access Proxy authentication flow

The following sequence diagram describes what happens when a user wants to access an application protected by the Identity and Access Proxy:

Alt text