SlideShare a Scribd company logo
1 of 7
AUTHENTICATION
AND
AUTHORIZATION
IN MERN STACK
APPLICATIONS
Add a little bit of body
text
Authentication and Authorization
are critical components of every
online application, especially those
created using the MERN stack
(MongoDB, Express.js, React,
Node.js). They aid in ensuring that
only authorized users have access
to specified resources or may
execute specific activities within the
program. To know more, check the
MERN Stack Training in Noida.
Authentication
and Authorization
in MERN Stack
Applications
Implementation of
Authentication and
Authorization in MERN
Stack Applications
The overview of the implementation of
Authentication and Authorization in
MERN Stack Applications has been
listed below for reference:
Authentication
Authentication can be referred to as the
process of verification of the identity of a
user. In a MERN Stack Application,
different authentication mechanisms like
username/password-based authentication
or social media authentication can be
put to use. The most common approach
is to use JSON web tokens (JWT) for
authentication.
• As soon as the user logs in with his valid login credentials, the
concerned server is known to generate a JWT which contains a
unique identifier for the user and signs it with a secret code.
• Following this, the server sends the JWT code back to the user
which securely stores it in a local storage or cookie.
• The client adds the JWT to the request headers for subsequent
requests to secured routes.
• Next, the server is given the task of verifying the authenticity as
well as the validity of the JWT by evaluating the expiration date
and signatures.
• If the JWT is proven to be valid, the user is held to be
authenticated by the server and is then allowed access to the
source asked for.
Authorization
Authorization is a process of defining
what the user can and cannot do
within a given application once
authenticated. It includes the
definition of roles, permissions, and
access levels for different resources
or routes.
THANK YOU!

More Related Content

Similar to Authentication and Authorization in MERN Stack Applications.pptx

apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfNordic APIs
 
Microsoft Graph API Delegated Permissions
Microsoft Graph API Delegated PermissionsMicrosoft Graph API Delegated Permissions
Microsoft Graph API Delegated PermissionsStefan Weber
 
OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)Knoldus Inc.
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...Good Dog Labs, Inc.
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...WebStackAcademy
 
Complete Guide to Setup Secure Scheme for Restful APIs
Complete Guide to Setup Secure Scheme for Restful APIsComplete Guide to Setup Secure Scheme for Restful APIs
Complete Guide to Setup Secure Scheme for Restful APIsXing (Xingheng) Wang
 
Understanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic ServerUnderstanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic ServerHojjat Abedie
 
A Survey on SSO Authentication protocols: Security and Performance
A Survey on SSO Authentication protocols: Security and PerformanceA Survey on SSO Authentication protocols: Security and Performance
A Survey on SSO Authentication protocols: Security and PerformanceAmin Saqi
 
Learn with WSO2 - API Security
Learn with WSO2 - API Security Learn with WSO2 - API Security
Learn with WSO2 - API Security WSO2
 
.NET Core, ASP.NET Core Course, Session 19
 .NET Core, ASP.NET Core Course, Session 19 .NET Core, ASP.NET Core Course, Session 19
.NET Core, ASP.NET Core Course, Session 19aminmesbahi
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceAmin Saqi
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...PROIDEA
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)Sabino Labarile
 

Similar to Authentication and Authorization in MERN Stack Applications.pptx (20)

apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
 
Microsoft Graph API Delegated Permissions
Microsoft Graph API Delegated PermissionsMicrosoft Graph API Delegated Permissions
Microsoft Graph API Delegated Permissions
 
OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 
Complete Guide to Setup Secure Scheme for Restful APIs
Complete Guide to Setup Secure Scheme for Restful APIsComplete Guide to Setup Secure Scheme for Restful APIs
Complete Guide to Setup Secure Scheme for Restful APIs
 
TMCnet final
TMCnet finalTMCnet final
TMCnet final
 
Understanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic ServerUnderstanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic Server
 
A Survey on SSO Authentication protocols: Security and Performance
A Survey on SSO Authentication protocols: Security and PerformanceA Survey on SSO Authentication protocols: Security and Performance
A Survey on SSO Authentication protocols: Security and Performance
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Learn with WSO2 - API Security
Learn with WSO2 - API Security Learn with WSO2 - API Security
Learn with WSO2 - API Security
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
.NET Core, ASP.NET Core Course, Session 19
 .NET Core, ASP.NET Core Course, Session 19 .NET Core, ASP.NET Core Course, Session 19
.NET Core, ASP.NET Core Course, Session 19
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and Performance
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 

More from Microsoft azure

Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxMicrosoft azure
 
Navigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxNavigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxMicrosoft azure
 
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxMicrosoft azure
 
Oracle Business Intelligence.pptx
Oracle Business Intelligence.pptxOracle Business Intelligence.pptx
Oracle Business Intelligence.pptxMicrosoft azure
 
The Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptxThe Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptxMicrosoft azure
 
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxThe Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxMicrosoft azure
 
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptx
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptxCreating a Successful Cloud-Based Modern Data Analytics Platform.pptx
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptxMicrosoft azure
 
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxMicrosoft azure
 
DevOps Best Practices (1).pdf
DevOps Best Practices (1).pdfDevOps Best Practices (1).pdf
DevOps Best Practices (1).pdfMicrosoft azure
 
Article - Google Docs.pdf
Article - Google Docs.pdfArticle - Google Docs.pdf
Article - Google Docs.pdfMicrosoft azure
 
DevOps Best Practices Ensuring Quality and Security (1).pptx
DevOps Best Practices Ensuring Quality and Security (1).pptxDevOps Best Practices Ensuring Quality and Security (1).pptx
DevOps Best Practices Ensuring Quality and Security (1).pptxMicrosoft azure
 
Authentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptxAuthentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptxMicrosoft azure
 
DevOps Best Practices Tips for Successful Implementation.pptx
DevOps Best Practices Tips for Successful Implementation.pptxDevOps Best Practices Tips for Successful Implementation.pptx
DevOps Best Practices Tips for Successful Implementation.pptxMicrosoft azure
 
Efficient Deep Learning Exploring the Power of Model Compression.pptx
Efficient Deep Learning Exploring the Power of Model Compression.pptxEfficient Deep Learning Exploring the Power of Model Compression.pptx
Efficient Deep Learning Exploring the Power of Model Compression.pptxMicrosoft azure
 
Your Complete Digital Marketing Course Guide for 2023
Your Complete Digital Marketing Course Guide for 2023Your Complete Digital Marketing Course Guide for 2023
Your Complete Digital Marketing Course Guide for 2023Microsoft azure
 
Navigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxNavigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxMicrosoft azure
 
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxThe Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxMicrosoft azure
 
Optimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxOptimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxMicrosoft azure
 
Optimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxOptimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxMicrosoft azure
 
Step-By-Step Instructions for Learning Tableau in 2023.pptx
Step-By-Step Instructions for Learning Tableau in 2023.pptxStep-By-Step Instructions for Learning Tableau in 2023.pptx
Step-By-Step Instructions for Learning Tableau in 2023.pptxMicrosoft azure
 

More from Microsoft azure (20)

Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
 
Navigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxNavigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptx
 
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
 
Oracle Business Intelligence.pptx
Oracle Business Intelligence.pptxOracle Business Intelligence.pptx
Oracle Business Intelligence.pptx
 
The Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptxThe Future of Cloud Computing Latest Trends and Innovations.pptx
The Future of Cloud Computing Latest Trends and Innovations.pptx
 
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxThe Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
 
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptx
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptxCreating a Successful Cloud-Based Modern Data Analytics Platform.pptx
Creating a Successful Cloud-Based Modern Data Analytics Platform.pptx
 
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptxDeep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
Deep Learning in Robotics Enhancing Perception and Decision-Making (1).pptx
 
DevOps Best Practices (1).pdf
DevOps Best Practices (1).pdfDevOps Best Practices (1).pdf
DevOps Best Practices (1).pdf
 
Article - Google Docs.pdf
Article - Google Docs.pdfArticle - Google Docs.pdf
Article - Google Docs.pdf
 
DevOps Best Practices Ensuring Quality and Security (1).pptx
DevOps Best Practices Ensuring Quality and Security (1).pptxDevOps Best Practices Ensuring Quality and Security (1).pptx
DevOps Best Practices Ensuring Quality and Security (1).pptx
 
Authentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptxAuthentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptx
 
DevOps Best Practices Tips for Successful Implementation.pptx
DevOps Best Practices Tips for Successful Implementation.pptxDevOps Best Practices Tips for Successful Implementation.pptx
DevOps Best Practices Tips for Successful Implementation.pptx
 
Efficient Deep Learning Exploring the Power of Model Compression.pptx
Efficient Deep Learning Exploring the Power of Model Compression.pptxEfficient Deep Learning Exploring the Power of Model Compression.pptx
Efficient Deep Learning Exploring the Power of Model Compression.pptx
 
Your Complete Digital Marketing Course Guide for 2023
Your Complete Digital Marketing Course Guide for 2023Your Complete Digital Marketing Course Guide for 2023
Your Complete Digital Marketing Course Guide for 2023
 
Navigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptxNavigating the Sky Careers with Cloud Computing Training.pptx
Navigating the Sky Careers with Cloud Computing Training.pptx
 
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptxThe Role of Machine Learning in Advancing Artificial Intelligence.pptx
The Role of Machine Learning in Advancing Artificial Intelligence.pptx
 
Optimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxOptimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptx
 
Optimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptxOptimizing Performance in MEAN Stack Apps.pptx
Optimizing Performance in MEAN Stack Apps.pptx
 
Step-By-Step Instructions for Learning Tableau in 2023.pptx
Step-By-Step Instructions for Learning Tableau in 2023.pptxStep-By-Step Instructions for Learning Tableau in 2023.pptx
Step-By-Step Instructions for Learning Tableau in 2023.pptx
 

Recently uploaded

Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdfVinayVadlagattu
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 

Recently uploaded (20)

Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 

Authentication and Authorization in MERN Stack Applications.pptx

  • 2. Authentication and Authorization are critical components of every online application, especially those created using the MERN stack (MongoDB, Express.js, React, Node.js). They aid in ensuring that only authorized users have access to specified resources or may execute specific activities within the program. To know more, check the MERN Stack Training in Noida. Authentication and Authorization in MERN Stack Applications
  • 3. Implementation of Authentication and Authorization in MERN Stack Applications The overview of the implementation of Authentication and Authorization in MERN Stack Applications has been listed below for reference:
  • 4. Authentication Authentication can be referred to as the process of verification of the identity of a user. In a MERN Stack Application, different authentication mechanisms like username/password-based authentication or social media authentication can be put to use. The most common approach is to use JSON web tokens (JWT) for authentication.
  • 5. • As soon as the user logs in with his valid login credentials, the concerned server is known to generate a JWT which contains a unique identifier for the user and signs it with a secret code. • Following this, the server sends the JWT code back to the user which securely stores it in a local storage or cookie. • The client adds the JWT to the request headers for subsequent requests to secured routes. • Next, the server is given the task of verifying the authenticity as well as the validity of the JWT by evaluating the expiration date and signatures. • If the JWT is proven to be valid, the user is held to be authenticated by the server and is then allowed access to the source asked for.
  • 6. Authorization Authorization is a process of defining what the user can and cannot do within a given application once authenticated. It includes the definition of roles, permissions, and access levels for different resources or routes.