Each target application or service is protected by two flows: an authentication- and an authorization flow.
The purpose of the authentication flow is to:
- identify the user
- run multiple authentication steps (and increase authentication strength to the required level)
- run supporting steps such as mandatory password change or token migration
The authorization flow on the other hand:
- checks required roles
- verifies terms of services
- other similar tasks
Both lists are not final and can also be extended with product and custom steps. Both the authentication- and the authorization flow must be completed successfully to trigger identity propagation.