As promised, IBM developerWorks has now published the second part of my article on Sentry 2. In this concluding segment, I dive into the Sentry 2 permission model, explaining how to create groups, assign users and permissions to them, and use permission checks to selectively enable application functions.

Also on the menu: find out how to harden your application with login throttling and temporary user deactivation, and integrate Sentry 2 with third-party authentication services like Google and Twitter.

Read the full article.