User authentication system
Who uses it: Backend developer designing an auth service
Why this works: Modeling authentication before implementing it surfaces design questions early: should Token be a value object or entity? Is Role separate from Permission? The diagram forces these decisions before code is written.
