Securing a WebStack Application

Making sure that Web applications are "secure" involves many different aspects of application design, deployment and administration. This document covers only the usage of the authentication features of the WebStack API.

Authentication in WebStack

There are two principal methods of introducing authentication and applying access control to WebStack applications:

Choosing an Authentication Strategy