© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. BakerSecure Web Application Development https://doi.org/10.1007/978-1-4842-8596-1_10

10. Authentication and Authorization

Matthew Baker1  
(1)
Kaisten, Aargau, Switzerland
 

In this chapter, we will look at options for authenticating users and determining what permissions they have been given. The most common authentication method is prompting for a username and password, so we will begin with that. Other authentication methods include one-time passwords and biometric data. We will look at how to implement those also.

Once a user has authenticated, the application must determine what permissions that user has. This is authorization, and we will look at various ...

Get Secure Web Application Development: A Hands-On Guide with Python and Django now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.