Extensible Security

The following sections outline how to develop and implement custom authentication and permissions modules.