This is a continuation of the last video, a very detailed take on how authentication is implemented in a full stack application, particularly in the backend using the 'jsonwebtoken' library.
We discuss how and why API end points are protected and how to make authentic requests to these endpoints.
There may be more cuts in this video than usual as this is my longest video till now. I hope you find it useful, any suggestions in the commention section are welcome.