In this chapter, we will look at options for authenticating users and determining what permissions they have been given. The most common authentication method is prompting for a username and password, so we will begin with that. Other authentication methods include one-time passwords and biometric data. We will look at how to implement those also.
Once a user has authenticated, the application must determine what permissions that user has. This is authorization, and we will look at various ...