Fig. 3
From: Multi-factor authentication for shibboleth identity providers

Authentication process using TOTP as the second factor
From: Multi-factor authentication for shibboleth identity providers
Authentication process using TOTP as the second factor