Behrang 3b5a4189ef Minor fix
These four items, not three items, constitute the auth process:

. A user is prompted to log in with a username and password.
. The system (successfully) verifies that the password is correct for the username.
. The context information for that user is obtained (their list of roles and so on).
. A security context is established for the user
2019-06-28 11:41:55 -05:00
..
2019-06-28 11:41:55 -05:00