I explained authorization in the earlier sections of this chapter, where you saw that authorization is the next step after authentication to access restricted resources.
Let's consider the following diagram, which depicts token-based authentication:
The preceding diagram shows a token-based authentication. If the request is verified (depending upon the identification of the credentials), then the client sends a request with the credentials and the returned token. The client then stores this token. It then sends these tokens with the headers in every request until the token is valid. If it is authorized to access the ...