Users and Security

Recap and Feedback


In this part, you learned how to add users to web applications and control what they can access.

You first learned about authentication and authorization, and how to securely handle passwords using cryptographic hashing. Then, you learned about different methods for tracking users across requests: cookies, sessions, and tokens. This was followed by implementing JWT-based authentication on both the server and client. You then learned how to protect routes and resources through authentication middleware and authorization checks. Next, you learned how to implement role-based access control to provide different access levels for different users. You then learned why production applications use authentication libraries, and integrated Better Auth into your application. After that, you learned about input validation using Zod to ensure data security at multiple layers. Finally, you learned about common web security vulnerabilities and how to prevent them.

Next, please reflect on your work on this part, and provide feedback on it. The feedback helps us improve the materials and the course.

We’ll add the feedback form here after the overaching project has been released.