Authentication and OAuth
The most common implementation of authentication requires a user to input their username or email and a password. The application’s server then checks the supplied credentials to determine if the user exists and if the supplied password is correct. If the credentials are correct, the user is logged in and able to use the application as that user. Typically, upon a successful login, the application will respond with an authentication token (or auth token) for the client to use for additional HTTP requests. This token is then stored on the user’s computer, preventing the need for users to continuously log in. This token generally expires after a certain amount of time, ensuring the correct user is using the application over time as well.
There is no comment yet, add the first one below!
Please log-in to add a comment
Log in