Basic
authorization used when in sign-in process, after signing-up.
Bearer
authorization used after basic auth done. for every request will use a bearer auth to verfiy if token match user token or not.
Generates a token that we can use with authorization and information exchange.
don’t create a weak secret.
don’t store it in a plain text.
don’t share your secret with anyone.
don’t use same secret for different accounts.
is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format — called “cipher text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.
it is a process that convert our passwords to hashed ones, with characters representation. to make our passwords secured. we use the bcrybt library to do this.
is a piece of a two-factor authentication security device that may be used to authorize the use of computer services.
it an encoded json, that we use in beare authorization to ensure if the user is authorized or not.
(also called token authentication) is an HTTP authentication scheme that involves security , Bearer authentication is a security scheme with type: http and scheme: bearer .
it is an authorization process, that use the header, and create and compare the token for the users, to allow them to reach a certain endpionts or not.
These non-human privileged credentials are often called “secrets” and refer to a private piece of information that acts as a key to unlock protected resources or sensitive information in tools, applications, containers, DevOps and cloud-native environments.
it is a signiture for the developper that make his token secure and no one can access his data when his secret is exists.
is a proposed Internet standard for creating data with optional signature and/or optional encryption whose payload holds JSON that asserts some number of claims. The tokens are signed either using a private secret or a public/private key