O'Reilly logo

Hands-On Full Stack Web Development with Aurelia by Erikson Haziz Murrugarra Sifuentes, Diego Jose Arguelles Rojas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we created a custom implementation to manage authentication and authorization in order to protect the use of our API from unauthorized users. You have seen that implementing Auth0 on your own might be a difficult task and will require more security layers than the ones we have implemented. A good practice is to use an external service to implement authentication and authorization in your projects. We created a simple application that uses one of the most popular third-party services, called Auth0.

We also covered how to integrate social login to our application, but we implemented this feature using Auth0 built-in social connection features. You can implement social authentication on your own, but again, it is better ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required