Replies: 1 comment
-
Hi @emazzu , I never used To put it simple, I use a JWT token for reach request that I need to secure. Inside the JWT token, I encrypt (yes, I encrypt it :- , not to get confused with singing the JWT token with a key) my payload because I use it sometimes I need to check certain things, for example, if the user is doing a transfer, I check if the payload contains one of the accountFrom and things like that. Only in on project I had to use We customize usually the So, subsequent calls What is your use case scenario, maybe I can give you some hints. |
Beta Was this translation helpful? Give feedback.
-
@marioestradarosa
Hi people, I'm delayed here without knowing how to continue.
here, there is a tutorial for security, but, I dont know, if the lb3 built in models (user, role, role mapping, acl, access token), migrated to loopback 4 or not ???
lb4
https://loopback.io/doc/en/lb4/Authentication-tutorial.html
lb3
https://loopback.io/doc/en/lb3/Authentication-authorization-and-permissions.html
Beta Was this translation helpful? Give feedback.
All reactions