Authentication & Authorization


author avatar author avatar
5 articles by 2 authors

Authorization (Roles)

author avatar
2 articles by 1 author

API Access (OAuth Access)

author avatar
1 article by 1 author

Authentication & Authorization

Security is of utmost importance, especially when it comes to embedded applications. Only authenticated users should be able to access the embedded content. At the same time, authenticated users shou…

Hardik Chheda
Updated 1 year ago by Hardik Chheda