Chapter 7. Restricting Access
This hour explains how to restrict access to parts of a Web site based on the identity of the user or on information about the request.
In this hour, you will learn
Authorization and authentication are common requirements for many Web sites. Authentication establishes the identity of parties in a communication. You can authenticate yourself by something you know (a password, a cookie), something you have (an ID card, a key), something you are (your fingerprint, your retina), or a combination of these ...