Auth; almost every application employs it. From verifying that a user is who they say they are, to restricting access to a protected resource. If your application isn’t secure, there’s a lot to lose. Let’s learn the difference between authentication and authorisation, and the best ways to implement them.


Comments are closed.

Jim Seconde at 10:50 on 14 Jul 2022

Really loved this talk on a subject matter that sometimes people can gloss over the basics. The progression was well laid out here: starting at basics and ending on fairly complex oauth and IoT device Auth flows.

Only real criticism is perhaps crowbar some more humour to break it up a bit: but breaking up quite dry subject matters is difficult (and other audience members would disagree that they want it flat tech)