Summary
In this chapter, we had the opportunity to review the recommended ways to implement authentication in different contexts. We covered user authentication in a web application scenario in a dedicated section and then reviewed the differences between user authentication from a native application standpoint and from a SPA standpoint as well. Throughout the chapter, we covered the advantages and disadvantages and the specific OAuth 2.0 flow to adopt according to the given circumstances. As we outlined in the chapter, whenever applicable, the Authorization Code Grant flow with PKCE is the recommended OAuth flow to adopt.
In the next chapter, we’re going to describe how these authentication patterns and OAuth flows relate to current IT trends, API proliferation, and service meshes, and, in general, how to match new trends to the concepts of authentication.