The diagram outlines the node handshake step which exchanges the authentication tokens used to access protected resources.
Figure 1. The diagram outlines the node handshake step which exchanges the authentication tokens used to access protected resources.