Build a User Authentication system (Part 2)
In part 1 we implemented the registration flow as part of adding a user to our database. We learnt about the recommended approach to storing passwords in the database using the SHA256 algorithm to convert our password into a string ‘hash’ combined wi...
creativebracket.com4 min read