Chapter 8. Adding authentication

Table of Contents

1. Authentication
2. Memory users
3. Changing the site structure
3.1. Using a subsite
3.2. The authentication element
3.3. The login form
4. Putting it all together
4.1. Inheritance
4.2. Child triggers
4.3. Adding an auth id variable
4.4. Inheriting the auth element
5. Finishing touches
5.1. Logging out
5.2. Conclusion

Our growing example, the Friends database, is now a quite complete web application. However, the fact that anyone can add friends to it makes it a bit less useful. We'd like to be able to put the application on a web page and make it readable for anyone, but only allow for ourselves to edit the list. This means that we must add some kind of password protection, or authentication.