This post is the first in a three-part series. The remaining two:
When you’re accessing services over the WEB – let’s pick GMail as an example – a couple of things have to happen upfront:
- The server you’re connecting to (GMail in our example) has to get to know who you are.
- Only after getting to know who you are it’s able to decide what resources you are allowed to access (e.g. your own email inbox, your Calendar, Drive etc.).
Step 1 above is called authentication. Step 2 is authorization (server can authorize only after successful authentication).
[Read More]