Summary

In this chapter, you learned about token-based authentication and saw how it can work in practice to reinforce the backend. To put it into practice, we wrote a simple token-based access system to protect access to a set of backend data. Our server is now almost complete, but we must still deal with some other pressing concerns that modern apps need to face.

In the next chapter, we will explore how to address one of these most important concerns.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.14.98