Advertisement

Authentication and User Management

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

Abstract

Controlling who can and who can’t access your application is an extremely important consideration when designing your applications. The authentication method you choose for your application will define how the identity of users is determined and verified. A comprehensive security model will also address authorization—the process of specifying what a user can do once he is logged into an application.

Keywords

User Management Authentication Scheme Custom Authentication Scheme Authentication Function Account Credential 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Tim Fox, John Edward Scott, and Scott Spendolini 2011

Authors and Affiliations

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

There are no affiliations available

Personalised recommendations