Summary
In this chapter, we went through all possible models of authentication. We will use all of them in the next chapter, and we will apply them to the web service functionality we just created.
Even if you had trouble with any of the examples, you can continue to the next chapter. As for your better understanding, we will go step-by-step and more in-depth into how we can leverage each available authentication model.
As you realize, it is important to choose the correct security management, otherwise information is exposed and can easily be intercepted and used by third parties.
Finally, in this chapter, we reviewed the differences between authentication and authorization. Both concepts are very important and definitely impossible to put aside in the context of security terms.
Now, we will ask you to join us to go ahead and secure our web service.