Journal of Advances in Developmental Research

E-ISSN: 0976-4844     Impact Factor: 9.71

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 1 January-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of January-June.

Securing Angular Applications - Authentication and Authorization Techniques

Author(s) Hareesh Kumar Rapolu
Country United States
Abstract The following research project has underscored that securing angular applications by authentication and authorization has been identified to be of immense vitality as it aids in tackling sensitive user data in a systematic sense. Utilizing techniques like JSON Web Tokens for authentication and Role-Based Access Controls for authorization has been proven to be instrumental in securing angular applications. Furthermore, the challenges have been minimised by the incorporation of secured data management and reinforcing data encryption and HTTPS. This has ultimately contributed to enhancing the possibilities of overall security posture therefore securing angular applications.
Keywords Authentication, Authorization, JWT, RBAC, Security, XSS, CSRF
Field Engineering
Published In Volume 10, Issue 2, July-December 2019
Published On 2019-10-05
Cite This Securing Angular Applications - Authentication and Authorization Techniques - Hareesh Kumar Rapolu - IJAIDR Volume 10, Issue 2, July-December 2019. DOI 10.5281/zenodo.14916847
DOI https://doi.org/10.5281/zenodo.14916847
Short DOI https://doi.org/g856m4

Share this