Isis uses Apache Shiro for authentication and authorization You can find further details in the documentation [1]
[1] http://isis.apache.org/components/security/shiro/about.html On Fri, Jun 21, 2013 at 11:54 PM, Okwui <[email protected]> wrote: > How do I implement a user management system?
