Choosing an authentication solution
Authentication is about ensuring people are who they claim to be. This can be done in many ways with their respective pros, cons and security concerns.
Follow the installation instructions - they will guide through the setup process, including requirements and customisation.
Once everything is installed you need to edit the configuration file to suit your specific needs.
Feel free to browse through the examples to get an understanding of how Butler Auth can be used.
There are also Youtube videos showing Butler Auth in action.
Authentication is about ensuring people are who they claim to be. This can be done in many ways with their respective pros, cons and security concerns.
How to install Butler Auth, including requirements and on what platforms it can be installed.
Everything you wanted to know about Butler Auth configuration but never dared to ask.
How to run Butler Auth once its been set up.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.