How the login screen works, the precedence of each auth method, keys in the config file, permission scopes
How the login screen works, the precedence of each auth method, keys in the config file, permission scopes