Securing the Application
In the final chapter, we will be implementing a number of security measures in our application. There are, in fact, a number of disparate tasks we will carry out under the “security” blanket. First, we will provision an SSL certificate for our domain, then we can restrict sensitive interactions between the user and application to HTTPS. We can subsequently implement secure login for our application’s users and store passwords in encrypted fields in the database.
While this may seem like a lot of tasks to carry out, there is some good news. So far, we’ve been diligent about security. Let’s quickly review some ...