Fig. 6From: Abstract security patterns and the design of secure systemsClass model of the SAML-based authenticatorBack to article page