This section provides information about configuring roles and users that can use Sentinel.
Section 4.0, Configuring Roles and Users
Section 5.0, Authentication Methods