6
6
Creating Your Own Auth Server and Middleware
7
7
--------------------------------------------
14
17
It's generally good to separate the authentication and authorization
15
18
procedures. Authentication verifies that a request actually comes from who it