In this chapter, you learned about token-based authentication and saw how it can work in practice to reinforce the backend. To put it into practice, we wrote a simple token-based access system to protect access to a set of backend data. Our server is now almost complete, but we must still deal with some other pressing concerns that modern apps need to face.
In the next chapter, we will explore how to address one of these most important concerns.
3.15.14.98