Security in Pyramid

Rich security models are one of Pyramid’s strengths. In this step we add authentication and authorization to our Projector application.

Note

Our goal is not to create a robust system for integrating external accounts. Quite the contrary, our goal is to do the smallest possible step, to focus on how login and ACLs work in Pyramid.

Table Of Contents