The following questions will allow you to consolidate the information contained in this chapter:
- What are authentication and authorization?
- Is it safe to use authentication at the first level of request and then allow incoming requests for restricted areas?
- How can you prove that authorization always comes after authentication?
- What is TDD and why do developers care about it?
- Define TDD katas. How do they help us to improve our TDD approach?