Security Mindset
Handling Sensitive Data
Authentication & Authorization
Session Management
JWT
Spring Security
Practice
Assignment
Back end Track
Under construction
<aside>
🚧
This page is currently under construction. Please check back later.
</aside>
Implementation plan:
- Authentication — "who are you?" (proving identity)
- Authorization — "what are you allowed to do?" (permissions)
- Examples: login (authentication) vs role-based access (authorization)
- How they work together in a typical application
- Common authentication methods: username/password, OAuth, API keys
The HackYourFuture curriculum is licensed under CC BY-NC-SA 4.0

*https://hackyourfuture.net/*
Found a mistake or have a suggestion? Let us know in the feedback form.