
Journal of Advances in Developmental Research
E-ISSN: 0976-4844
•
Impact Factor: 9.71
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 1
2025
Indexing Partners



















Securing Angular Applications - Authentication and Authorization Techniques
Author(s) | Hareesh Kumar Rapolu |
---|---|
Country | United States |
Abstract | The following research project has underscored that securing angular applications by authentication and authorization has been identified to be of immense vitality as it aids in tackling sensitive user data in a systematic sense. Utilizing techniques like JSON Web Tokens for authentication and Role-Based Access Controls for authorization has been proven to be instrumental in securing angular applications. Furthermore, the challenges have been minimised by the incorporation of secured data management and reinforcing data encryption and HTTPS. This has ultimately contributed to enhancing the possibilities of overall security posture therefore securing angular applications. |
Keywords | Authentication, Authorization, JWT, RBAC, Security, XSS, CSRF |
Field | Engineering |
Published In | Volume 10, Issue 2, July-December 2019 |
Published On | 2019-10-05 |
Cite This | Securing Angular Applications - Authentication and Authorization Techniques - Hareesh Kumar Rapolu - IJAIDR Volume 10, Issue 2, July-December 2019. DOI 10.5281/zenodo.14916847 |
DOI | https://doi.org/10.5281/zenodo.14916847 |
Short DOI | https://doi.org/g856m4 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJAIDR DOI prefix is
10.71097/IJAIDR
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
