Hi,
Exactly what are you attempting to do?
The user must know the username along with the password to login to a system. Therefore the validity of the login will setup the account via the system. Once the user is logged in then the permission(s) will control what that user is able to perform.
|