Putting this interesting look at a token based authentication implementation that has some similarities to what I’ve done. Want to track the followup comments.
Putting this interesting look at a token based authentication implementation that has some similarities to what I’ve done. Want to track the followup comments.