Why Restrict Access?
Real-Time Phoenix — by Stephen Bussey (31 / 106)
It has been a common occurrence to hear about data leaks from improperly secured data or endpoints. This type of security issue can hit any application, including ones based on Phoenix Channels. Luckily, there is a built-in mechanism to close these security vulnerabilities.
There are two different types of access restriction that we’ll focus on. The first type of restriction…