Hi Sandeep,I'm working on a project where the authentication of the users would be performed against the external user database system. Just wondering whether you can share the high-level of the approach you undertook to meet the project requirement. Thanks in advance.