The backend implementation could be file-based, database, LDAP, etc. but these implementation details shouldn't be exposed by exceptions. author: fdietz