Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Rust Web Development with Rocket

You're reading from   Rust Web Development with Rocket A practical guide to starting your journey in Rust web development using the Rocket framework

Arrow left icon
Product type Paperback
Published in Jun 2022
Publisher Packt
ISBN-13 9781800561304
Length 420 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Karuna Murti Karuna Murti
Author Profile Icon Karuna Murti
Karuna Murti
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1: An Introduction to the Rust Programming Language and the Rocket Web Framework
2. Chapter 1: Introducing the Rust Language FREE CHAPTER 3. Chapter 2: Building Our First Rocket Web Application 4. Chapter 3: Rocket Requests and Responses 5. Chapter 4: Building, Igniting, and Launching Rocket 6. Chapter 5: Designing a User-Generated Application 7. Part 2: An In-Depth Look at Rocket Web Application Development
8. Chapter 6: Implementing User CRUD 9. Chapter 7: Handling Errors in Rust and Rocket 10. Chapter 8: Serving Static Assets and Templates 11. Chapter 9: Displaying Users' Post 12. Chapter 10: Uploading and Processing Posts 13. Chapter 11: Securing and Adding an API and JSON 14. Part 3: Finishing the Rust Web Application Development
15. Chapter 12: Testing Your Application 16. Chapter 13: Launching a Rocket Application 17. Chapter 14: Building a Full Stack Application 18. Chapter 15: Improving the Rocket Application 19. Other Books You May Enjoy

Authorizing users

Authentication and authorization are two of the main concepts of information security. If authentication is a way to prove that an entity is who they say they are, then authorization is a way to give rights to the entity. One entity might be able to modify some resources, one entity might be able to modify all resources, one entity might only be able to see limited resources, and so on.

In the previous section, we implemented authentication concepts such as login and CurrentUser; now it's time to implement authorization. The idea is that we make sure logged-in users can only modify their own information and posts.

Please keep in mind that this example is very simple. In more advanced information security, there are more advanced concepts, such as role-based access control. For example, we can create a role called admin, we can set a certain user as admin, and admin can do everything without restrictions.

Let's try implementing simple authorization...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image