Introduction
Authentication is a process to identify user's identity and grant them access to the resources provided by application. In backend development,
authentication plays a major role to grant or restrict users to access specific resources.
Authentication can be done in two ways: -
Token-Based Authentication.
Session-Based Authentication.
Here we'll talk about Token Based Authentication.
Token-Based Authentication
Token-based authentication is a widely used security mechanism to offer robust experience to users without compromising with the security.
In the token-based authentication, when user logged in server generates unique token for users. After server generates the token, it will be sent to client and stored on client's system locally. Whenever client makes a request, this token go with each request to verify the identity of user.
Authentication Process
REQUEST- When user login to the application, browser made a request to server with user credentials.
VERIFICATION - When request comes to the server it validates the user and generates a secret key known as token and send it to user via HTTP.
Generally, the token is sent in a JWT [jsonWebTokens] open standard that consist of a header, payload, signature.VALIDATE TOKEN - When user receives the token secret code it saves on client's browser as it helps to verify identity whenever user makes a request. this token is short lived have a life span of 15-60min and this token is also known as access token code. If user unable to use access token code, then it will request for refresh token code which stays in system for 3-4 days.
RESPONSE - When the validation is done then token grants or restrict user to access specific content.
Example
Let's take an example, we'll implement token-based authentication using register and login methodology.
First, we will create functionality for Register module for a user:-
STEP1: - Register User
Register uses collects data from user to create account
// FIRSTLY, WE'LL SELECT THE REGISTER FORM const form = document.querySelector(".register"); // ADDING EVENT LISTENER TO FORM TO COLLECT THE VALUES FROM USER form.addEventListener("submit", (e) => { e.preventDefault(); const username = e.target.username.value; const email = e.target.email.value; const password = e.target.password.value; });
STEP2: - Encrypting the password
Before saving user's data to database, we first need to encrypt the password for security purpose then save it to database.
For encrypting the password, we use npm package bcrypt.
Firstly, we need to install the package by writing in terminal: -
npm install bcrypt
Now, we'll hash the password like this
// FIRSTLY, WE'LL SELECT THE REGISTER FORM const form = document.querySelector(".register"); // ADDING EVENT LISTENER TO FORM TO COLLECT THE VALUES FROM USER form.addEventListener("submit", (e) => { e.preventDefault(); const username = e.target.username.value; const email = e.target.email.value; const password = e.target.password.value; });
bcrypt.hash is a function which hashes the password with salt rounds. It generates different hashed key every time weather any of two users have same password.
Login functionality
When any user try to login, it retrieves hashed password from database and compare it with password given by user during login
// IMPORTING BCRYPT MODULE const bcrypt=require('bcrypt'); // ASSIGNING USERS PASSWORD const plainPassword=userPassword // ENCRYPTING PASSWORD // BASIC SYNTAX // bcrypt.hash(plainTextPassword,salt_rounds) const hashedPassword=bcrypt.hash(plainPassword,10); if(!hashedPassword){ throw new Error('Enable to generate password') } // NOW WE WILL SAVE USER DETAILS AND PASSWORD TO DATABASE console.log('Hashed Password is : ',hashedPassword)
The above is the detailed content of Authentication System Using NodeJS. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Java and JavaScript are different programming languages, each suitable for different application scenarios. Java is used for large enterprise and mobile application development, while JavaScript is mainly used for web page development.

The following points should be noted when processing dates and time in JavaScript: 1. There are many ways to create Date objects. It is recommended to use ISO format strings to ensure compatibility; 2. Get and set time information can be obtained and set methods, and note that the month starts from 0; 3. Manually formatting dates requires strings, and third-party libraries can also be used; 4. It is recommended to use libraries that support time zones, such as Luxon. Mastering these key points can effectively avoid common mistakes.

PlacingtagsatthebottomofablogpostorwebpageservespracticalpurposesforSEO,userexperience,anddesign.1.IthelpswithSEObyallowingsearchenginestoaccesskeyword-relevanttagswithoutclutteringthemaincontent.2.Itimprovesuserexperiencebykeepingthefocusonthearticl

JavaScriptispreferredforwebdevelopment,whileJavaisbetterforlarge-scalebackendsystemsandAndroidapps.1)JavaScriptexcelsincreatinginteractivewebexperienceswithitsdynamicnatureandDOMmanipulation.2)Javaoffersstrongtypingandobject-orientedfeatures,idealfor

Event capture and bubble are two stages of event propagation in DOM. Capture is from the top layer to the target element, and bubble is from the target element to the top layer. 1. Event capture is implemented by setting the useCapture parameter of addEventListener to true; 2. Event bubble is the default behavior, useCapture is set to false or omitted; 3. Event propagation can be used to prevent event propagation; 4. Event bubbling supports event delegation to improve dynamic content processing efficiency; 5. Capture can be used to intercept events in advance, such as logging or error processing. Understanding these two phases helps to accurately control the timing and how JavaScript responds to user operations.

JavaScripthassevenfundamentaldatatypes:number,string,boolean,undefined,null,object,andsymbol.1)Numbersuseadouble-precisionformat,usefulforwidevaluerangesbutbecautiouswithfloating-pointarithmetic.2)Stringsareimmutable,useefficientconcatenationmethodsf

If JavaScript applications load slowly and have poor performance, the problem is that the payload is too large. Solutions include: 1. Use code splitting (CodeSplitting), split the large bundle into multiple small files through React.lazy() or build tools, and load it as needed to reduce the first download; 2. Remove unused code (TreeShaking), use the ES6 module mechanism to clear "dead code" to ensure that the introduced libraries support this feature; 3. Compress and merge resource files, enable Gzip/Brotli and Terser to compress JS, reasonably merge files and optimize static resources; 4. Replace heavy-duty dependencies and choose lightweight libraries such as day.js and fetch

The main difference between ES module and CommonJS is the loading method and usage scenario. 1.CommonJS is synchronously loaded, suitable for Node.js server-side environment; 2.ES module is asynchronously loaded, suitable for network environments such as browsers; 3. Syntax, ES module uses import/export and must be located in the top-level scope, while CommonJS uses require/module.exports, which can be called dynamically at runtime; 4.CommonJS is widely used in old versions of Node.js and libraries that rely on it such as Express, while ES modules are suitable for modern front-end frameworks and Node.jsv14; 5. Although it can be mixed, it can easily cause problems.
