6. Controlling the Login