Authorizations can only be performed after a successful authentication because authorization data (roles, permissions, etc) must always be associated with a known identity. Such a known identity can only be obtained upon a successful log-in. @author Les Hazlewood @since 0.1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|