The Real Application Security architecture is depicted. This is described in text.