-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
134 - Guest Course Intro #3
Comments
before diving into code, lets answer one question. why we need to secure our application? the answer to this one comes from another situation of question |
imagine you have an application with sensitive data ex: transactions or credentials. would u allow anyone who is not authorised to access your information anytime they want. the answer ofc is no what we need to do in this case is that we need to implement a security layer to secure all the accesses to our application. |
to implement security within an application, there are multiple ways. we can implement use basic auth, security login, oauth 2.0 implementation, web sso aka single-sign-on, we can also use api management systems or api keys-based authentication. |
in this course, were gonna learn how to secure an application using basic auth authentication and JWT bearer token authentication. dont forget to subscribe to their channel again! 👉🏿 Subscribe to @BoualiAli channel - https://www.youtube.com/@BoualiAli |
Timestamp: (134) 134 / 315
The text was updated successfully, but these errors were encountered: