Explaining the authentication interceptor