Summary
This chapter introduced Node security practices and the different forms of access authentication for Node applications and APIs. We described different methods for authenticating and authorizing users to access resources from the frontend and backend using JWT and passport.
The first section introduced us to Node security and best practices for securing applications. We also described modules, features, and measures such as Helmet, input validations, regular expressions, security.txt, session management, and cross-site request forgery for implementing and ensuring security. That section ended with an introduction to authorization and authentication. The next section covered the authentication of Node applications using JWT. JWT's structure was demystified and explained with comprehensive exercises. The chapter ended with us describing and implementing passport strategies such as Facebook, local, JWT, and Twitter to authenticate the security login sessions of Node applications.
In the...