Token-based authorization

I explained authorization in the earlier sections of this chapter, where you saw that authorization is the next step after authentication to access restricted resources.

Let's consider the following diagram, which depicts token-based authentication:

The preceding diagram shows a token-based authentication. If the request is verified (depending upon the identification of the credentials), then the client sends a request with the credentials and the returned token. The client then stores this token. It then sends these tokens with the headers in every request until the token is valid. If it is authorized to access the ...

Get Building RESTful Web Services with .NET Core now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.