Last Revised: 07/11/2021
A learning journey through implementation of authentication and authorization in backend applications with a focus on modern day practices and trends. We will also dive into some of the attack trajectories and how mitigate them.
1.1 Defining Authentication Layer [R]
1.2 Markdown Blog Authentication [L]
1.3 Authentication Persistence [R]
1.4 Adding Authorization Layer [R]
1.5 Authorization through middleware [R]
1.6 Blog Authentication Guard [L]
3 Other Security Vulnerabilities and Practices [R]
5 Summary