How does the IMAP auth work without having every possible IMAP user in the users table?
How does the IMAP auth work without having every possible IMAP user in the users table?