Isis uses Apache Shiro for authentication and authorization  You can
find further details in the documentation [1]

[1] http://isis.apache.org/components/security/shiro/about.html

On Fri, Jun 21, 2013 at 11:54 PM, Okwui <[email protected]> wrote:
> How do I implement a user management system?

Reply via email to