Lifelong learner. Security Enthusiast blogging at https://www.securitydrops.com
I will not cross-post future content to Medium. Everything I write is available on my blog at https://www.securitydrops.com
See you there!
This post is part of a multi-part series. It builds on the first post, where I describe the framework we will use to evaluate authentication schemes. If you have not, it is probably a good idea to read it now hint.
As a developer, you will most likely get in the situation, where you have to decide how to authenticate your API. How would you deal with it?