Behrang 48a5c854fd Minor fix
These four items, not three items, constitute the auth process:

. A user is prompted to log in with a username and password.
. The system (successfully) verifies that the password is correct for the username.
. The context information for that user is obtained (their list of roles and so on).
. A security context is established for the user
2019-06-28 11:42:12 -05:00
..
2019-03-26 20:06:43 -04:00
2019-03-26 21:14:36 -04:00
2019-06-28 11:42:12 -05:00
2017-04-21 10:55:05 -05:00