Behrang 3b5a4189ef Minor fix
These four items, not three items, constitute the auth process:

. A user is prompted to log in with a username and password.
. The system (successfully) verifies that the password is correct for the username.
. The context information for that user is obtained (their list of roles and so on).
. A security context is established for the user
2019-06-28 11:41:55 -05:00
..
2019-03-19 17:33:29 -05:00
2019-03-19 23:53:23 -05:00
2019-06-28 11:41:55 -05:00
2017-04-21 10:55:05 -05:00