Figure 1. The diagram outlines the node handshake step which exchanges the authentication tokens used to access protected resources.