Edit me on GitHub

Security in Pyramid

Rich security models are one of Pyramid’s strengths. In this step we add authentication and authorization to our Projector application.

Note

Our goal is not to create a robust system for integrating external accounts. Quite the contrary, our goal is to do the smallest possible step, to focus on how login and ACLs work in Pyramid.

Table Of Contents

Previous topic

Step 02: Form Handling

Next topic

Step 01: Hello World for ACLs