Authentication and Authorization (Day 129)

Total hours: 246.000

Top three:

1) Authentication

Split into three seperate levels to plan and design based on threat and security requirements instead of providing just one size fits all.

Despite that being what I wanted from the get go and to design an application with 0 settings or close to 0. But really wanted 0 settings options.

2) Authorization

This is different than than authentication. It’s designed to be a second layer of design for cautious or strict mode.

3) Key Management

Still not fully figured out.

You'll only receive email when they publish something new.

More from Gaya
All posts