June 2022
Intermediate to advanced
586 pages
11h 38m
English
One of the important aspects of building secure applications is to ensure that users have access only to the resources that they need. In the real world, when you check in to a hotel, a front-desk employee validates your ID and credit card and assigns a key card to access your room. Based on the type of room you have chosen, you may have privileges, such as access to the lounge, pool, or gym, among others. Here, the validation of your ID and credit card and assigning a key card is called authentication, and permitting you to access the various resources is called authorization. So, to explain it further, using a key card, we cannot identify who you are but can determine what you can do.
Authorization ...
Read now
Unlock full access