Introduction
The previous chapter introduced us to frontend development with Angular. We learned how to jump-start frontend development using the Angular CLI and gainfully engaged with exercises and activities that taught us how to implement various features, such as directives, components, templates, reactive forms, and so on. In Chapter 2, Developing RESTful APIs to Perform CRUD Operations, we described RESTful APIs and their design concepts, and also developed an HTTP server for a Node application (backend development).
In this chapter, we will be continuing with the backend development; however, the focus will be on securing access to the use of APIs and securing Node applications in general. This chapter introduces Node application security practices and different forms of authentication. You will learn how to grant user access to the RESTful API that we developed in the previous chapter and perform user authentication on Node applications. This chapter also describes the structure...