Skip to the content.
Home Page
Class 07 Notes
Review, Research, and Discussion
- Proper order for tokens is: register your application to get a client_id and client_secret, ask the client if they want to sign in via a third party, make a request to a third-party API endpoint, receive access token, receive authorization code, make a request to the access token endpoint, and redirect to a third party authentication endpoint.
- With an auth code we are able to make sure that the person that is attempting to access our database, is allowed to do so.
- With an access token you are able to verify if there was any tampering while a request was being sent to the server/databse.
- The benefits of usiong OAuth vs your own authentication is that OAuth is more secure beccause they have better encoding and encryption.
Terms
- Router Middleware: A router is a software module that helps direct paths for specific operations.
- Dynamic Module Loading: This means that modules and tasks are done dynamically by writing code that can accept random bits of information to fill gaps in code. Basically filling a variable with a value in order to complete some predefined processes.
- Singleton Pattern: This is the singular flow of data almost like iterating through a for loop.
- Mock Testing: This is testing used to see if your code will work. Using fake data to test functions.