Authentication and User Management
Controlling who can and who can’t access your application is an extremely important consideration when designing your applications. The authentication method you choose for your application will define how the identity of users is determined and verified. A comprehensive security model will also address authorization—the process of specifying what a user can do once he is logged into an application.
KeywordsUser Management Authentication Scheme Custom Authentication Scheme Authentication Function Account Credential
Unable to display preview. Download preview PDF.