The purpose of this article is to provide a brief description of the things that take place in order for a client request to be authenticated in a common IWA scenario using a transparent deployment, as well as describe what can be happening when one of the steps is not happening as intended.
The steps for authentication in transparent deployments are as follows: