Sub-Activities Of Access Process
Initializing Security Context
Validating Principal’s credentials,
creating initial security context
Enriching Security Context
Collecting additional claims and
transforming them into facts
[Evaluating facts against policies,
computing access decision]
Applying Security Context
Communicating access decision
to the Relying Party and obtaining access