Trongate Website Homepage

Objectives and Goals

The primary objective is to construct secure, large-scale applications that accommodate multiple secure and private areas tailored to various user levels. For instance, in a university IT system, the user levels might include:

Each user level in such a system may experience a completely different interface and set of functionalities. For example, the admin panel for lecturers could be entirely distinct from the one for students. Additionally, the mechanisms and rules for logging users in and out of the system could vary significantly based on the user level.

Trongate facilitates this by utilizing a token system. A 'token' is a random string of characters generated by the framework. This token can be issued to users upon successful login and subsequently used for authentication and authorization purposes. From the end user's perspective, this process is seamless and automatic, with users remaining unaware of the underlying mechanisms handling authentication and authorization.

Did You Know?

'Authentication' refers to the process by which an application verifies the identity of a user. 'Authorization' refers to the process by which an application grants or denies access to a user. While these two concepts are closely related, they are distinct processes.