Summary
This chapter introduces authentication and authorization. We looked at the differences between the functions of authentication and authorization. Next, we looked at two key authentication and authorization strategies in software today: single sign-on and open authorization. We concluded by implementing code in our example that utilizes Google for SSO and OAuth.
In the next chapter, we look at critical mitigations for the risks introduced when we accept input for our software.