Revision: 1c1d39d.
Configuration guide, A.29. JGroups Protocols, Authorization protocols
I think it's better to speak of AUTH as an authentication protocol instead of an authorization one? The nodes in cluster don't have any specific roles, AUTH is just about verifying that the newcomer is really one of the permitted nodes.