A computer receives an authentication request from a client. The computer
creates a temporary user object and populates it with identification
information from the authentication request. The computer then forwards
the authentication request to an authentication source. Once the
authentication source has validated the authentication request, the
computer queries the authentication source for identification
information, populates the temporary user object with the identification
information, and makes the user object permanent.