Week 10

Security Mindset

Handling Sensitive Data

Authentication & Authorization

Session Management

JWT

Spring Security

Practice

Assignment

Back end Track

Under construction

<aside> 🚧

This page is currently under construction. Please check back later.

</aside>

Implementation plan:

  1. Authentication — "who are you?" (proving identity)
  2. Authorization — "what are you allowed to do?" (permissions)
  3. Examples: login (authentication) vs role-based access (authorization)
  4. How they work together in a typical application
  5. Common authentication methods: username/password, OAuth, API keys

The HackYourFuture curriculum is licensed under CC BY-NC-SA 4.0

CC BY-NC-SA 4.0 Icons

*https://hackyourfuture.net/*

Found a mistake or have a suggestion? Let us know in the feedback form.