Articles

Authentication with Auth Tokens

Instead of sending the user’s credentials in each request, a common approach is to use tokens. Tokens generally consist of a header, a payload, and a signature.