Consider this scenario:
- A company has deployed 3 resources - Resource 1, Resource 2, and Resource 3
- A client wishes to access Resource 1 (get a representation of Resource 1)
- All client requests go through a proxy server
- The proxy server enforces the policy that access to Resource 2 and Resource 3 is allowed. However, Resource 1 is off limits (for example, suppose that Resource 1 is Hotmail, and the client's company policy prohibits accessing Hotmail using the company's lines).