From 1e26ab58a345dce3603c89c71f172f773ccc56b0 Mon Sep 17 00:00:00 2001
From: HS <24558802+h-s04@users.noreply.github.com>
Date: Mon, 12 Sep 2022 19:11:09 +0800
Subject: [PATCH] Update 103-token-authentication.md (#1734)
---
.../106-authentication/103-token-authentication.md | 14 +++++++++++++-
1 file changed, 13 insertions(+), 1 deletion(-)
diff --git a/content/roadmaps/101-backend/content/109-apis/106-authentication/103-token-authentication.md b/content/roadmaps/101-backend/content/109-apis/106-authentication/103-token-authentication.md
index 368549660..8b9f100f6 100644
--- a/content/roadmaps/101-backend/content/109-apis/106-authentication/103-token-authentication.md
+++ b/content/roadmaps/101-backend/content/109-apis/106-authentication/103-token-authentication.md
@@ -1 +1,13 @@
-# Token authentication
\ No newline at end of file
+# Token authentication
+
+Token-based authentication is a protocol which allows users to verify their identity, and in return receive a unique access token. During the life of the token, users then access the website or app that the token has been issued for, rather than having to re-enter credentials each time they go back to the same webpage, app, or any resource protected with that same token.
+
+Auth tokens work like a stamped ticket. The user retains access as long as the token remains valid. Once the user logs out or quits an app, the token is invalidated.
+
+Token-based authentication is different from traditional password-based or server-based authentication techniques. Tokens offer a second layer of security, and administrators have detailed control over each action and transaction.
+
+But using tokens requires a bit of coding know-how. Most developers pick up the techniques quickly, but there is a learning curve.
+
+
+Free Content
+What Is Token-Based Authentication?