Rich security models are one of Pyramid’s strengths. In this step we add authentication and authorization to our Projector application.
Note
Our goal is not to create a robust system for integrating external accounts. Quite the contrary, our goal is to do the smallest possible step, to focus on how login and ACLs work in Pyramid.