Authentication is about ensuring people are who they claim to be. This can be done in many ways with their respective pros, cons and security concerns.
Follow the installation instructions - they will guide through the setup process, including requirements and customisation.
Once everything is installed you need to edit the configuration file to suit your specific needs.
Try it out!
How to install Butler Auth, including requirements and on what platforms it can be installed.
Everything you wanted to know about Butler Auth configuration but never dared to ask.
How to run Butler Auth once its been set up.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.