Michael Ellerbeck Sadly, there are only a few references about these authorization scheme evaluation points. But if you store your roles in a custom table, it should be straightforward to implement it. The authorization scheme is not dependent on the authentication scheme to me.