1. Creates new userlist with name <listname>. Many independent userlists can be
    2. used to store authentication & authorization data for independent customers.
    1. Adds user <username> to the current userlist. Both secure (encrypted) and
    2. insecure (unencrypted) passwords can be used. Encrypted passwords are
    3. evaluated using the crypt(3) function, so depending on the system's
    4. based Linux systems support MD5, SHA-256, SHA-512, and, of course, the
    5. classic DES-based method of encrypting passwords.
    6.  
    7. Attention: Be aware that using encrypted passwords might cause significantly
    8. increased CPU usage, depending on the number of requests, and the algorithm
    9. be processed through the chosen algorithm, before it can be compared to the
    10. value specified in the config file. Most current algorithms are deliberately
    11. designed to be expensive to compute to achieve resistance against brute
    12. force attacks. They do not simply salt/hash the clear text password once,
    13. but thousands of times. This can quickly become a major factor in haproxy's
    1. Please note that both lists are functionally identical.