Users and Security

Overview


So far in the course, all users have been treated the same. Everyone has had the right to add, edit, and delete data, even if the data was not created by them. In this part, we look into how to register users and how to log in to the application. We also look into how to keep track of the users and how to verify that the users are only using the parts of the application they are allowed to use. We finally briefly look into a few common web security flaws and how to avoid them.

The structure of this part is as follows:

Finally, at the end of the part, there is a recap and feedback chapter that briefly summarizes the part and asks for feedback on the part.