Making sure that Web applications are "secure" involves many different aspects of application design, deployment and administration. This guide currently only covers the usage of the authentication features of the WebStack API.
There are two principal methods of introducing authentication and applying access control to WebStack applications:
Here is a comparison of the features of these mechanisms:
Application-Wide Authenticators | LoginRedirect and Login Modules | |
---|---|---|
Deployment |
|
|
Flexibility |
|
|