A step-by-step “page-through” of how authorisation and authentication proceeds in the Shabti boilerplate auth’n’auth.
In effect, the exact same process is followed, almost irrespective of whichever persistence is chosen for the model. This means that once the authentication and authorisation process is understood, you can mentally optimize it away and concentrate on the stuff that actually matters.
There’s no copying and pasting required here, simply sit back and watch the trail unfold. The recommended interaction style is just to click the “next” / “prev” links in the upper right of the page.
The process follows what happens when the app receives a request for an access-protected resource, in this instance:
http://localhost:5000/demo/privindex
Read on ...
The original Tesla authentication and authorisation was written by Dan Jacob and Ben Bangert.
author: | Graham Higgins <gjh@bel-epa.com> |
---|---|
date: | September 06, 2010 |