Company
Date Published
Author
Shadid Haque
Word count
1459
Language
English
Hacker News points
None

Summary

⚠️ Disclaimer ⚠️ This post refers to a previous version of FQL (v4). For the most current version of the language, visit our FQL documentation. User authentication in Fauna is implemented using User-defined functions (UDFs) and secret tokens. A client application ships with a limited-privilege secret token that can only register and login users in Fauna. Authenticated users receive a temporary access token to securely access Fauna resources. The key points of the text cover creating a new secret key, configuring roles, shipping the secret key as an environment variable, running UDFs to create a new user, acquire a user access token, and use it to interact with Fauna resources. Additionally, it discusses connecting Fauna with the client application, defining authenticated user roles, and implementing user logout functionality.