Authentication and User Management

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

Abstract

Controlling who can and who can’t access your application is an extremely important consideration when designing your applications. The authentication method you choose for your application will define how the identity of users is determined and verified. A comprehensive security model will also address authorization—the process of specifying what a user can do once he is logged into an application.

Keywords

Editing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Tim Fox, John Edward Scott, and Scott Spendolini 2011

Authors and Affiliations

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

There are no affiliations available

Personalised recommendations