BRIEF DESCRIPTION OF THE FIGURES
FIG. 1 illustrates logical network architecture for providing end point compliance, dynamic network identity, network threat management and network policy management.
FIG. 2 illustrates the IdM service in greater detail.
FIG. 3 is an optional call flow diagram illustrating an interaction of the IdM service and an application or network service.