Sub-Activities Of Access Process
*Initializing Security Context
*Validating Principal’s credentials,
creating initial security context
*Enriching Security Context
*Collecting additional claims and
transforming them into facts
*[Evaluating facts against policies,
computing access decision]
*Applying Security Context
*Communicating access decision
to the Relying Party and obtaining access