A customer server receives a client request to access protected resources
over the Internet. First factor authentication is performed and if it is
successful a vendor authentication engine is invoked to undertake second
factor authentication. The results of the second factor authentication
are returned to the customer server, which grants access only if both
first and second factor authentication succeeds.