Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think a user should be able to tell the difference. The initial handshake would still use something like passwords or API keys to authenticate the user.

The difference is post-login, where authentication can return for example a 'session key' or can return a JWT or other token that can then be used to say, "I've logged in, I'm xnorswap and I'm allowed in the system until 202204051200Z. I'm allowed access to view users and create reports".



Post login scenario which can happen also after a password authentication :) I mean it already happens, in places... (but your point about distributed heavy duty systems still stands, to keep in mind)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: