{"id":13684,"date":"2024-02-14T08:54:30","date_gmt":"2024-02-14T01:54:30","guid":{"rendered":"https:\/\/bap-software.net\/?post_type=knowledge&#038;p=13684"},"modified":"2024-05-30T14:19:00","modified_gmt":"2024-05-30T07:19:00","slug":"authentication-vs-authorization-in-software-development","status":"publish","type":"knowledge","link":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/","title":{"rendered":"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83"},"content":{"rendered":"<p>\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><strong>1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95<\/strong><\/h2>\n<div id=\"attachment_13694\" style=\"width: 1264px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13694\" class=\"wp-image-13694 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163355\/Authentication1.jpg\" alt=\"What is authentication?\" width=\"1254\" height=\"836\" \/><p id=\"caption-attachment-13694\" class=\"wp-caption-text\">\uc778\uc99d\uc740 \uc815\ubcf4 \uc778\uc99d\uc758 \ud55c \ud615\ud0dc\ub85c, \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \ubcf4\uc548 \uc218\uc900\uc744 \ub192\uc785\ub2c8\ub2e4. \ucd9c\ucc98: globalsign.com<\/p><\/div>\n<h3><strong>1.1. \uac1c\ub150<\/strong><\/h3>\n<p>\uc778\uc99d\uc740 \uc0ac\uc6a9\uc790 \uc815\ubcf4 \ubc0f \uc554\ud638\ub97c \uc778\uc99d\ud558\uc5ec \uc2e0\uc6d0\uc744 \ud655\uc778\ud558\uace0 \uc0ac\uc6a9\uc790\uac00 \ud2b9\uc815 \ub370\uc774\ud130\uc5d0 \uc561\uc138\uc2a4\ud560 \uad8c\ud55c\uc774 \uc788\ub294\uc9c0 \ud655\uc778\ud558\ub294 \uacfc\uc815\uc785\ub2c8\ub2e4.<\/p>\n<h3><strong>1.2. \ubd84\ub958<\/strong><\/h3>\n<p>\uc778\uc99d\uc5d0\ub294 \ub450 \uac00\uc9c0 \uc720\ud615\uc774 \uc788\uc2b5\ub2c8\ub2e4: HTTP \uae30\ubcf8 \uc778\uc99d \ubc0f \ub2e4\uc911 \uc694\uc18c \uc778\uc99d.<\/p>\n<p><strong>&#8211; HTTP \uae30\ubcf8 \uc778\uc99d<\/strong><\/p>\n<p>HTTP \uae30\ubcf8 \uc778\uc99d\uc740 HTTP \ud504\ub85c\ud1a0\ucf5c\uc744 \ud1b5\ud574 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ubcf4\uc548\uc744 \uac15\ud654\ud558\uae30 \uc704\ud55c \uc778\uc99d \ud615\uc2dd\uc785\ub2c8\ub2e4. \uc774 \ud615\uc2dd\uc740 \uc0ac\uc6a9\uc790\uac00 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc0ac\uc6a9\ud560 \ub54c \ub85c\uadf8\uc778 \uc774\ub984\uacfc \uc554\ud638\ub97c \uc81c\uacf5\ud558\ub3c4\ub85d \uc694\uad6c\ud569\ub2c8\ub2e4. \uc11c\ubc84\ub294 \ube0c\ub77c\uc6b0\uc800\uc5d0\uc11c \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\uc5ec \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ub2e4\uc911 \uc694\uc18c \uc778\uc99d (MFA)<\/strong><\/p>\n<p>\ub2e4\uc911 \uc694\uc18c \uc778\uc99d\uc740 \uc5ec\ub7ec \ub2e8\uacc4\uc758 \uc778\uc99d \ub2e8\uacc4\ub97c \ud544\uc694\ub85c \ud558\ub294 \ubcf4\uc548 \uc2dc\uc2a4\ud15c\uc73c\ub85c, \ub85c\uadf8\uc778 \ub610\ub294 \ub2e4\ub978 \ud615\ud0dc\uc758 \ud2b8\ub79c\uc7ad\uc158\uc744 \uc218\ud589\ud558\uae30 \uc704\ud574 \uc5ec\ub7ec \uc778\uc99d \ub2e8\uacc4\ub97c \ud544\uc694\ub85c \ud569\ub2c8\ub2e4.<\/p>\n<p>\ub2e4\uc911 \uc694\uc18c \uc778\uc99d\uc740 \uc8fc\ub85c \ube44\ubc00\ubc88\ud638, \ubcf4\uc548 \ud1a0\ud070 \ubc0f \uc0dd\uccb4 \uc778\uc99d\uc744 \uacb0\ud569\ud569\ub2c8\ub2e4.<\/p>\n<p>\uc5ec\ub7ec \uac00\uc9c0 \uc694\uc18c\ub97c \uacb0\ud569\ud558\uba74 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0 \uacac\uace0\ud55c \ubcf4\uc548 \uacc4\uce35\uc774 \uc0dd\uc131\ub418\uc5b4 \ud574\ucee4\ub85c\ubd80\ud130\uc758 \uce68\uc785\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4.<\/p>\n\t\t\t<div class=\"related_one_post\">\n\t\t\t\t<p class=\"title_label\"> \uad00\ub828 \uae30\uc0ac <\/p>\n\t\t\t\t<div class=\"one_post_contents\">\n\t\t\t\t\t<div class=\"thumb\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.bap-software.net\/2019\/08\/android-smartphone-app-development.jpg\" alt=\"\uc2a4\ub9c8\ud2b8\ud3f0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uac1c\ubc1c \uc2dc \uba3c\uc800 \uace0\ub824\ud574\uc57c \ud560 \uc0ac\ud56d\ub4e4\" \/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t<h6 class=\"title_one_post\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/smartphone-application-development\/\" title=\"\uc2a4\ub9c8\ud2b8\ud3f0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uac1c\ubc1c \uc2dc \uba3c\uc800 \uace0\ub824\ud574\uc57c \ud560 \uc0ac\ud56d\ub4e4\"> \uc2a4\ub9c8\ud2b8\ud3f0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uac1c\ubc1c \uc2dc \uba3c\uc800 \uace0\ub824\ud574\uc57c \ud560 \uc0ac\ud56d\ub4e4 <\/a>\n\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t\t<div class=\"read_more\">\n\t\t\t\t\t\t\t<p class=\"read_more_text\">\n\t\t\t\t\t\t\t\t\uc2a4\ub9c8\ud2b8\ud3f0 \uc0ac\uc6a9\uc790 \uc99d\uac00\uc640 \ud568\uaed8, \ub9c8\ucf00\ud305 \uc804\ub7b5\uc5d0\uc11c \uc2a4\ub9c8\ud2b8\ud3f0 \uc571\uc758 \ud65c\uc6a9\uc740 \uace0\uac1d\uc744 \uc720\uce58\ud558\uace0 \ub9e4\ucd9c\uc744 \uc99d\uac00\uc2dc\ud0a4\uba70 \uc778\uc9c0\ub3c4\ub97c \ub192\uc774\ub294 \ub370 \uc911\uc694\ud55c \uc694\uc18c\uac00 \ub418\uc5c8\uc2b5?...\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<p class=\"link_read_more\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/smartphone-application-development\/\"> \ub354 \ubcf4\uae30\t\t\t\t\t\t\t\t\t<i class=\"fa fa-angle-right\"><\/i>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n<h3><strong>1.3. \uc77c\ubd80 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95<\/strong><\/h3>\n<p><strong>&#8211; \ube44\ubc00\ubc88\ud638<\/strong><\/p>\n<p>\ube44\ubc00\ubc88\ud638\ub294 \uac00\uc7a5 \uac04\ub2e8\ud558\uace0 \uc27d\uac8c \ubc30\ud3ec\ud560 \uc218 \uc788\ub294 \uc778\uc99d \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \ube44\ubc00\ubc88\ud638\ub97c \uc785\ub825\ud558\ub3c4\ub85d \uc694\uccad\ubc1b\uc73c\uba70, \uc2dc\uc2a4\ud15c\uc740 \uc815\ubcf4\ub97c \uc77c\ubc29\ud5a5 \uc554\ud638\ud654\ub41c \ud615\ud0dc\ub85c \uc800\uc7a5\ud558\uc5ec \ud574\ud0b9\ub418\ub354\ub77c\ub3c4 \ube44\ubc00\ubc88\ud638\ub97c \ubcf5\uad6c\ud560 \uc218 \uc5c6\uac8c \ubcf4\uc7a5\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \uacf5\uac1c \uc804\uc790\ud0a4<\/strong><\/p>\n<p>\uacf5\uac1c \ud0a4 \uc554\ud638\ud654\ub294 \uacf5\uac1c \ud0a4\uc640 \uac1c\uc778 \ud0a4\ub97c \uc0ac\uc6a9\ud55c \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc744 \ud1b5\ud55c \uc778\uc99d \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc2dc\uc2a4\ud15c \ub9ac\uc18c\uc2a4\uc5d0 \uc561\uc138\uc2a4\ud558\ub824\uba74 \uae30\uae30\uc5d0 \uac1c\uc778 \ud0a4\uac00 \uc788\uc5b4\uc57c \ud558\uba70 \ub85c\uadf8\uc778 \uc815\ubcf4\ub97c \uae30\uc5b5\ud558\uc9c0 \uc54a\uace0 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0 \ub85c\uadf8\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \uc0dd\uccb4 \uc778\uc99d<\/strong><\/p>\n<p>\uc0dd\uccb4 \uc778\uc99d\uc740 \uc9c0\ubb38, \uc5bc\uad74 \ubc0f \uae30\ud0c0 \uc778\uac04\uc758 \uc0dd\uccb4\uc801\uc778 \uc694\uc18c\ub97c \ud1b5\ud55c \uc778\uc99d \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc740 \uc0ac\uc6a9\uc790\uac00 \uae30\uc5b5\ud558\uc9c0 \ubabb\ud560 \uacbd\uc6b0\ub97c \ub300\ube44\ud558\uc5ec ID \ubc0f \ube44\ubc00\ubc88\ud638\uc640 \uacb0\ud569\ub420 \ub54c \uc8fc\ub85c \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/p>\n<h2><strong>2. \uc0ac\uc6a9\uc790 \ub85c\uadf8\uc778 \uc800\uc7a5 \uba54\ucee4\ub2c8\uc998<\/strong><\/h2>\n<p>\uc0ac\uc6a9\uc790 \ub85c\uadf8\uc778 \uc800\uc7a5 \uba54\ucee4\ub2c8\uc998\uc5d0\ub294 \uae30\ubcf8 \uc778\uc99d, \uc138\uc158 \uae30\ubc18 \uc778\uc99d \ubc0f \ud1a0\ud070 \uae30\ubc18 \uc778\uc99d\uc774\ub77c\ub294 3\uac00\uc9c0 \uae30\ubcf8 \uba54\ucee4\ub2c8\uc998\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h3><strong>2.1. \uae30\ubcf8 \uc778\uc99d<\/strong><\/h3>\n<div id=\"attachment_13695\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13695\" class=\"wp-image-13695 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163359\/Authentication2-e1707187033697.jpg\" alt=\"Basic Authentication\" width=\"1200\" height=\"510\" \/><p id=\"caption-attachment-13695\" class=\"wp-caption-text\">\uae30\ubcf8 \uc778\uc99d\uc740 \uac00\uc7a5 \uc77c\ubc18\uc801\uc774\uace0 \uac00\uc7a5 \uac04\ub2e8\ud55c \uc0ac\uc6a9\uc790 \ub85c\uadf8\uc778 \uc800\uc7a5 \uba54\ucee4\ub2c8\uc998\uc785\ub2c8\ub2e4. \ucd9c\ucc98: wallarm.com<\/p><\/div>\n<p><strong>Basic Authentication<\/strong>\ub294 \uc6f9 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc758 \uac00\uc7a5 \uac04\ub2e8\ud55c \uc778\uc99d \uba54\ucee4\ub2c8\uc998 \uc911 \ud558\ub098\ub85c, \ub9ce\uc740 \uc11c\ubc84\uc5d0\uc11c \uc790\ub3d9\uc73c\ub85c \uc27d\uac8c \ud1b5\ud569\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\uc7a5\uc810:<\/strong><\/p>\n<ul>\n<li>\uac04\ub2e8\ud558\uba70 \ub300\ubd80\ubd84\uc758 \ube0c\ub77c\uc6b0\uc800\uc640 \uc11c\ubc84\uc640 \ud638\ud658\ub428<\/li>\n<li>\ucfe0\ud0a4, \uc138\uc158, \ud1a0\ud070\uc744 \uc0ac\uc6a9\ud55c \ub2e4\ub978 \ubc29\ubc95\uacfc \uc27d\uac8c \uacb0\ud569 \uac00\ub2a5<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\ub2e8\uc810:<\/strong><\/p>\n<ul>\n<li>\uac01 \uc694\uccad\uc774 \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \ube44\ubc00\ubc88\ud638\ub97c \uc804\uc1a1\ud574\uc57c \ud558\ubbc0\ub85c \ube44\ubc00\ubc88\ud638 \ubc0f \ub85c\uadf8\uc778 \uc774\ub984\uc5d0 \ub300\ud55c \uc815\ubcf4\ub97c \uc27d\uac8c \ub178\ucd9c\uc2dc\ud0ac \uc218 \uc788\uc74c.<\/li>\n<li>\ub85c\uadf8\uc778 \uc815\ubcf4\ub97c \ube0c\ub77c\uc6b0\uc800\uc5d0 \uc790\ub3d9\uc73c\ub85c \uc800\uc7a5\ud574\uc57c \ud558\ubbc0\ub85c \uc0ac\uc6a9\uc790\uac00 \uc218\ub3d9\uc73c\ub85c \ub85c\uadf8\uc778\ud560 \uc218 \uc5c6\uc74c.<\/li>\n<li>\uc0ac\uc6a9\uc790 \uce5c\ud654\uc801\uc774\uc9c0 \uc54a\uc740 \uc778\ud130\ud398\uc774\uc2a4\ub85c \uc0ac\uc6a9\uc790 \uacbd\ud5d8\uc744 \ub9e4\uc6b0 \uc9c0\ub8e8\ud558\uac8c \ub9cc\ub4e6.<\/li>\n<\/ul>\n<h2><strong>2.2. \uc138\uc158 \uae30\ubc18 \uc778\uc99d<\/strong><\/h2>\n<div id=\"attachment_13696\" style=\"width: 811px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13696\" class=\"wp-image-13696 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png\" alt=\"Session-based Authentication\" width=\"801\" height=\"446\" \/><p id=\"caption-attachment-13696\" class=\"wp-caption-text\">\uc138\uc158 \uae30\ubc18 \uc778\uc99d\uc740 \ucfe0\ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub97c \uc800\uc7a5\ud558\ub294 \uba54\ucee4\ub2c8\uc998\uc785\ub2c8\ub2e4. \ucd9c\ucc98: dienmaycholon.vn<\/p><\/div>\n<h3><strong>2.2. \uc138\uc158 \uae30\ubc18 \uc778\uc99d<\/strong><\/h3>\n<p>\uc138\uc158 \uae30\ubc18 \uc778\uc99d\uc740 \uc11c\ubc84 \uc0ac\uc6a9\uc790 \uc138\uc158\uc744 \uae30\ubc18\uc73c\ub85c \ud558\ub294 \uc2e0\uc6d0 \ud655\uc778 \uba54\ucee4\ub2c8\uc998\uc785\ub2c8\ub2e4. \uc131\uacf5\uc801\uc778 \uc778\uc99d \ud6c4, \uc11c\ubc84\ub294 \uc0ac\uc6a9\uc790\uc758 \ube44\ubc00\ubc88\ud638\uc640 \uc0ac\uc6a9\uc790 \uc774\ub984\uc744 \uc800\uc7a5\ud569\ub2c8\ub2e4.<\/p>\n<p>\uc11c\ubc84\uc758 \uc800\uc7a5 \uc704\uce58\ub294 \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc640 \ud30c\uc77c\uc774\uace0, \ud074\ub77c\uc774\uc5b8\ud2b8\uc758 \uc800\uc7a5 \uc704\uce58\ub294 \ucfe0\ud0a4 \uba54\ubaa8\ub9ac\uc640 \uc6f9\uc0ac\uc774\ud2b8 URL\uc785\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\uc7a5\uc810:<\/strong><\/p>\n<p><strong>&#8211; \uc815\ubcf4\uac00 \ube44\uacf5\uac1c\ub85c \uc720\uc9c0\ub428: <\/strong><\/p>\n<p>\ud074\ub77c\uc774\uc5b8\ud2b8\ub294 \uc804\uc1a1 \ud504\ub85c\uc138\uc2a4 \uc911\uc5d0 \uc5b4\ub5a0\ud55c \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub3c4 \uc54c\uc9c0 \ubabb\ud558\uace0 \uc138\uc158 ID\ub9cc\uc744 \uc54c\uac8c \ub429\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \uc791\uc740 \uc815\ubcf4 \uc804\uc1a1 \uc6a9\ub7c9: <\/strong><\/p>\n<p>\uc138\uc158 ID\ub294 \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub97c \ud3ec\ud568\ud558\uc9c0 \uc54a\uace0 \uc57d 20-50\uc790\uc758 \ud2b9\uc218 \ubb38\uc790\uc5f4\uc77c \ubfd0\uc774\ubbc0\ub85c \uac01 \uc694\uccad\uc740 \uc791\uc740 \uc6a9\ub7c9\uc774\uba70 \uc804\uc1a1\uc774 \ub354 \uc27d\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0\uac8c \uc601\ud5a5\uc744 \ubbf8\uce58\uc9c0 \uc54a\uc74c:<\/strong><\/p>\n<p>\uc138\uc158 \uae30\ubc18 \uc778\uc99d \uc0ac\uc6a9\uc790 \uc800\uc7a5 \uba54\ucee4\ub2c8\uc998\uc740 \uc11c\ubc84 \uce21\uc5d0\uc11c\ub9cc \uc815\ubcf4\ub97c \ud3b8\uc9d1\ud558\uba74 \ub429\ub2c8\ub2e4. \ube0c\ub77c\uc6b0\uc800\ub294 \uac70\uc758 \ucd94\uac00 \uc815\ubcf4\ub97c \ucc98\ub9ac\ud558\uc9c0 \uc54a\uace0 \uc790\ub3d9\uc73c\ub85c \uc751\ub2f5\ud569\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n\t\t\t<div class=\"related_one_post\">\n\t\t\t\t<p class=\"title_label\"> \uad00\ub828 \uae30\uc0ac <\/p>\n\t\t\t\t<div class=\"one_post_contents\">\n\t\t\t\t\t<div class=\"thumb\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.bap-software.net\/2024\/01\/23210107\/SmartphoneApp2.png\" alt=\"\uae30\uc5c5\uc740 \uc6f9 \uc571 \ub610\ub294 \ubaa8\ubc14\uc77c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uac1c\ubc1c\ud558\uae30\ub97c \uc120\ud0dd\ud574\uc57c \ud569\ub2c8\ub2e4.\" \/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t<h6 class=\"title_one_post\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/develop-web-apps-or-mobile-applications\/\" title=\"\uae30\uc5c5\uc740 \uc6f9 \uc571 \ub610\ub294 \ubaa8\ubc14\uc77c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uac1c\ubc1c\ud558\uae30\ub97c \uc120\ud0dd\ud574\uc57c \ud569\ub2c8\ub2e4.\"> \uae30\uc5c5\uc740 \uc6f9 \uc571 \ub610\ub294 \ubaa8\ubc14\uc77c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uac1c\ubc1c\ud558\uae30\ub97c \uc120\ud0dd\ud574\uc57c \ud569\ub2c8\ub2e4. <\/a>\n\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t\t<div class=\"read_more\">\n\t\t\t\t\t\t\t<p class=\"read_more_text\">\n\t\t\t\t\t\t\t\t\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0 \uad00\ud55c \uc774\uc57c\uae30\uac00 \ub418\uba74 \ub450 \uac00\uc9c0 \ud070 \uc601\uc5ed\uc774 \uc788\uc2b5\ub2c8\ub2e4: \uc6f9 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uac1c\ubc1c\uacfc \ubaa8\ubc14\uc77c \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uac1c\ubc1c. \uc62c\ubc14\ub978 \uc720\ud615\uc758 \uc571\uc744 \uc120\ud0dd\ud558?...\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<p class=\"link_read_more\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/develop-web-apps-or-mobile-applications\/\"> \ub354 \ubcf4\uae30\t\t\t\t\t\t\t\t\t<i class=\"fa fa-angle-right\"><\/i>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n<p><strong>\ub2e8\uc810:<\/strong><\/p>\n<p><strong>&#8211; \ub9ce\uc740 \uba54\ubaa8\ub9ac\ub97c \ucc28\uc9c0\ud568:<\/strong><\/p>\n<p>\uac01 \uc0ac\uc6a9\uc790 \uc694\uccad\ub9c8\ub2e4 \ud074\ub77c\uc774\uc5b8\ud2b8\ub294 \uc0c8\ub85c\uc6b4 \uc138\uc158\uc744 \ub9cc\ub4e4\uc5b4 \uba54\ubaa8\ub9ac\uc5d0 \uc800\uc7a5\ud569\ub2c8\ub2e4. \uc138\uc158\uc758 \uc99d\uac00\ub294 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc758 \uba54\ubaa8\ub9ac \uacfc\ubd80\ud558\ub97c \ucd08\ub798\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ub370\uc774\ud130 \uacc4\uc0b0\uc774 \uc5b4\ub824\uc6c0: <\/strong><\/p>\n<p>\uc138\uc158 \ub370\uc774\ud130\uac00 \uc11c\ubc84\uc5d0 \uc800\uc7a5\ub418\ubbc0\ub85c \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ub370\uc774\ud130\ub97c \uacc4\uc0b0\ud558\ub294 \ub370 \uc5b4\ub824\uc6c0\uc774 \uc788\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ub3c4\uba54\uc778\uc5d0 \ub530\ub77c \ub2e4\ub984:<\/strong><\/p>\n<p>\ucfe0\ud0a4\ub97c \ud1b5\ud55c \ud655\uc778\uc758 \uacbd\uc6b0 \ucfe0\ud0a4\ub294 \ub3c4\uba54\uc778\uc5d0 \ub530\ub77c \ub2ec\ub77c\uc9c0\ubbc0\ub85c \uc0ac\uc6a9\uc790\uc758 \ub85c\uadf8\uc778\uc740 \ub3c4\uba54\uc778\uc5d0 \uc758\uc874\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \uacf5\uaca9\uc5d0 \ucde8\uc57d\ud568: <\/strong><\/p>\n<p>\uc138\uc158 ID\ub294 \ub300\ubd80\ubd84 \ucfe0\ud0a4\uc5d0 \uc800\uc7a5\ub418\ub294\ub370, \ucfe0\ud0a4\ub294 \ud574\ucee4\uc758 \uacf5\uaca9\uc5d0 \ucde8\uc57d\ud558\ubbc0\ub85c \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc774 \uacf5\uaca9\uc5d0 \ub178\ucd9c\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h3><strong>2.3. \ud1a0\ud070 \uae30\ubc18 \uc778\uc99d<\/strong><\/h3>\n<div id=\"attachment_13697\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13697\" class=\"wp-image-13697 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163409\/Authentication4.jpg\" alt=\"Token-based Authentication\" width=\"1000\" height=\"562\" \/><p id=\"caption-attachment-13697\" class=\"wp-caption-text\">\ud1a0\ud070 \uae30\ubc18 \uc778\uc99d\uc740 \ub9ce\uc740 \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0 \uc801\ud569\ud55c \uc0ac\uc6a9\uc790 \uc815\ubcf4 \uc800\uc7a5 \uba54\ucee4\ub2c8\uc998\uc785\ub2c8\ub2e4. \ucd9c\ucc98: hackernoon.com<\/p><\/div>\n<h3><strong>2.3. \ud1a0\ud070 \uae30\ubc18 \uc778\uc99d<\/strong><\/h3>\n<p>\ud1a0\ud070 \uae30\ubc18 \uc778\uc99d\uc740 \uc11c\ubc84\uc5d0\uc11c \uc0dd\uc131\ub41c \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub97c \ud3ec\ud568\ud558\ub294 \ubb38\uc790\uc5f4\uc744 \uc0dd\uc131\ud558\uace0 \ud074\ub77c\uc774\uc5b8\ud2b8 \ucef4\ud4e8\ud130\uc5d0 \uc800\uc7a5\ud558\ub294 \uc2e0\uc6d0 \ud655\uc778 \uba54\ucee4\ub2c8\uc998\uc785\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\uc7a5\uc810:<\/strong><\/p>\n<p><strong>&#8211; \uc0c1\ud0dc\uac00 \uc5c6\uc74c: <\/strong><\/p>\n<p>\ud1a0\ud070\uc740 \uc790\uccb4 \uc800\uc7a5\ub418\ubbc0\ub85c \uc11c\ubc84\ub294 \uc5b4\ub5a0\ud55c \uc815\ubcf4\ub3c4 \uc800\uc7a5\ud560 \ud544\uc694\uac00 \uc5c6\uc2b5\ub2c8\ub2e4. \uc774\ub294 \ud1a0\ud070\uc758 \ucd9c\ucc98\ub97c \uc54c \ud544\uc694\uc5c6\uc774 \uc218\ud3c9 \uc751\uc6a9 \uacc4\uc0b0 (\uc218\ud3c9 \ud655\uc7a5\uc131)\uc744 \uac00\ub2a5\ud558\uac8c \ud569\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ub2e4\uc591\ud55c \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0 \uc801\ud569: <\/strong><\/p>\n<p>\ud1a0\ud070\uc740 \uc6f9 \ube0c\ub77c\uc6b0\uc800, \ubaa8\ubc14\uc77c \uc560\ud50c\ub9ac\ucf00\uc774\uc158, IoT \uae30\uae30\ub97c \ud3ec\ud568\ud55c \ub2e4\uc591\ud55c \ud074\ub77c\uc774\uc5b8\ud2b8\ub97c \ud6a8\uacfc\uc801\uc73c\ub85c \uc800\uc7a5\ud558\uace0 \uc804\uc1a1\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \ub3c4\uba54\uc778\uc5d0 \uc81c\ud55c\ub418\uc9c0 \uc54a\uc74c: <\/strong><\/p>\n<p>\ud1a0\ud070\uc744 \uc0ac\uc6a9\ud558\uba74 \ucfe0\ud0a4\ub97c \uc0ac\uc6a9\ud558\ub294 \uba54\ucee4\ub2c8\uc998\uacfc \ub2ec\ub9ac \uc11c\ub4dc \ud30c\ud2f0\uac00 \ub354 \uc27d\uac8c \uc6b4\uc601\ud560 \uc218 \uc788\uc73c\uba70 \ub3c4\uba54\uc778\uc5d0 \uc758\uc874\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n\t\t\t<div class=\"related_one_post\">\n\t\t\t\t<p class=\"title_label\"> \uad00\ub828 \uae30\uc0ac <\/p>\n\t\t\t\t<div class=\"one_post_contents\">\n\t\t\t\t\t<div class=\"thumb\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/05223636\/microservice4.jpg\" alt=\"Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9\" \/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t<h6 class=\"title_one_post\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/microservices-and-api-gateway\/\" title=\"Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9\"> Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9 <\/a>\n\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t\t<div class=\"read_more\">\n\t\t\t\t\t\t\t<p class=\"read_more_text\">\n\t\t\t\t\t\t\t\t\uae30\uc220 \ubc1c\uc804 \uc2dc\ub300\uc5d0\ub294 \ub2e4\uc591\ud55c \ud50c\ub7ab\ud3fc\uacfc \ud1b5\ud569\ub41c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc774 \uc0ac\uc6a9\uc790\ub4e4 \uc0ac\uc774\uc5d0\uc11c \ud2b8\ub80c\ub4dc\ub85c \uc790\ub9ac\uc7a1\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ubcf5\uc7a1\ud55c \uc560\ud50c\ub9ac\ucf00...\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<p class=\"link_read_more\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/microservices-and-api-gateway\/\"> \ub354 \ubcf4\uae30\t\t\t\t\t\t\t\t\t<i class=\"fa fa-angle-right\"><\/i>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n<p><strong>\ub2e8\uc810:<\/strong><\/p>\n<p><strong>&#8211; \ub85c\uadf8\uc544\uc6c3 \uad00\ub9ac\uac00 \uc5b4\ub824\uc6c0: <\/strong><\/p>\n<p>\uc11c\ubc84\ub294 \uc0ac\uc6a9\uc790 \ud1a0\ud070 \ub610\ub294 \uc138\uc158\uc5d0 \ub300\ud55c \uc5b4\ub5a0\ud55c \uc815\ubcf4\ub3c4 \uc800\uc7a5\ud558\uc9c0 \uc54a\uae30 \ub54c\ubb38\uc5d0 \ub85c\uadf8\uc544\uc6c3\uc744 \uc81c\uc5b4\ud558\uae30 \uc5b4\ub824\uc6cc\uc9d1\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; \uc815\ubcf4\uac00 \uc27d\uac8c \ub178\ucd9c\ub428: <\/strong><\/p>\n<p>\uc0ac\uc6a9\uc790 \ub85c\uadf8\uc778 \uc138\uc158\uc5d0 \ub300\ud55c \uc815\ubcf4\uac00 \ud1a0\ud070\uc5d0 \uc788\uc73c\uba70 \ud074\ub77c\uc774\uc5b8\ud2b8 \uce21\uc5d0 \uc800\uc7a5\ub418\uc5b4 \uc788\uc73c\ubbc0\ub85c \uc804\uc1a1 \uc911\uc5d0 \uc815\ubcf4 \ub178\ucd9c\uc758 \uc704\ud5d8\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><strong>3. \uad8c\ud55c\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uad8c\ud55c \ubd80\uc5ec \ubc29\ubc95<\/strong><\/h2>\n<div id=\"attachment_13698\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13698\" class=\"wp-image-13698 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163413\/Authentication5-e1708480549831.jpg\" alt=\"What is Authorization?\" width=\"1920\" height=\"1080\" \/><p id=\"caption-attachment-13698\" class=\"wp-caption-text\">\uad8c\ud55c\uc740 \uc2e0\uc6d0 \ud655\uc778 \uc774\ud6c4 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ub370\uc774\ud130\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uc218\uc900\uc744 \uc778\uc99d\ud558\ub294 \uacfc\uc815\uc785\ub2c8\ub2e4. \ucd9c\ucc98: cybermeteoroid.com<\/p><\/div>\n<h3><strong>3.1. \uac1c\ub150<\/strong><\/h3>\n<p>\uad8c\ud55c\uc740 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc758 \ub370\uc774\ud130\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uad8c\ud55c\uc744 \uacb0\uc815\ud558\ub294 \uacfc\uc815\uc785\ub2c8\ub2e4. \uc2e0\uc6d0 \ud655\uc778 \ud504\ub85c\uc138\uc2a4 \uc774\ud6c4 \uad8c\ud55c \ubd80\uc5ec \ud504\ub85c\uc138\uc2a4\uac00 \ubc1c\uc0dd\ud558\uc5ec \ud30c\uc77c, \ub370\uc774\ud130\ubca0\uc774\uc2a4, \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ub610\ub294 \uae30\ud0c0 \ub9ac\uc18c\uc2a4 \uc0ac\uc6a9 \uad8c\ud55c \uc218\uc900\uc744 \uacb0\uc815\ud569\ub2c8\ub2e4.<\/p>\n<p>\uad8c\ud55c\uc758 \ubaa9\uc801\uc740 \uc0ac\uc6a9\uc790\uac00 \ub77c\uc774\uc120\uc2a4 \uad8c\ud55c\uc744 \ud589\uc0ac\ud558\uace0 \ubcf4\ud638\ub41c \ud0a4\ub85c \ub9ac\uc18c\uc2a4\uc5d0 \uc561\uc138\uc2a4\ud558\uba70, \uad8c\ud55c\uc774 \uc5c6\ub294 \uc0ac\uc6a9\uc790\ub85c\ubd80\ud130\uc758 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n<h3><strong>3.2. \uba87 \uac00\uc9c0 \uad8c\ud55c \ubd80\uc5ec \ubc29\ubc95:<\/strong><\/h3>\n<p><strong>&#8211; API \ud0a4<\/strong><\/p>\n<p>API \ud0a4\ub294 \uc8fc\ub85c \ud2b9\uc815 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uacfc \uad00\ub828\ub41c \uad8c\ud55c \ubd80\uc5ec \ud615\uc2dd\uc73c\ub85c, API \ud0a4\ub97c \uc0ac\uc6a9\ud558\ub294 \uc0ac\uc6a9\uc790\ub97c \uc2dd\ubcc4\ud569\ub2c8\ub2e4. API\ub294 \uacf5\uac1c \ud0a4\uc640 \ube44\ubc00 \ud0a4\ub85c \uad6c\uc131\ub418\uc5b4 \uc11c\ubc84\uc640 \uc0ac\uc6a9\uc790 \uac04\uc758 \ud1b5\uc2e0\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/p>\n\t\t\t<div class=\"related_one_post\">\n\t\t\t\t<p class=\"title_label\"> \uad00\ub828 \uae30\uc0ac <\/p>\n\t\t\t\t<div class=\"one_post_contents\">\n\t\t\t\t\t<div class=\"thumb\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/05223636\/microservice4.jpg\" alt=\"Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9\" \/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t<h6 class=\"title_one_post\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/microservices-and-api-gateway\/\" title=\"Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9\"> Microservices\uc640 API \uac8c\uc774\ud2b8\uc6e8\uc774: \uc911\uc694\uc131\uacfc \uc2e4\uc81c \uc751\uc6a9 <\/a>\n\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t\t<div class=\"read_more\">\n\t\t\t\t\t\t\t<p class=\"read_more_text\">\n\t\t\t\t\t\t\t\t\uae30\uc220 \ubc1c\uc804 \uc2dc\ub300\uc5d0\ub294 \ub2e4\uc591\ud55c \ud50c\ub7ab\ud3fc\uacfc \ud1b5\ud569\ub41c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \uc0ac\uc6a9\ud558\ub294 \uac83\uc774 \uc0ac\uc6a9\uc790\ub4e4 \uc0ac\uc774\uc5d0\uc11c \ud2b8\ub80c\ub4dc\ub85c \uc790\ub9ac\uc7a1\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ubcf5\uc7a1\ud55c \uc560\ud50c\ub9ac\ucf00...\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<p class=\"link_read_more\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/bap-software.net\/kr\/knowledge\/microservices-and-api-gateway\/\"> \ub354 \ubcf4\uae30\t\t\t\t\t\t\t\t\t<i class=\"fa fa-angle-right\"><\/i>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n<p><strong>&#8211; \uae30\ubcf8 \uc778\uc99d<\/strong><\/p>\n<p>\uae30\ubcf8 \uc778\uc99d\uc740 \uc0ac\uc6a9\uc790\uac00 HTTPS\ub97c \ud1b5\ud574 \ud5e4\ub354\uc5d0 \ub85c\uadf8\uc778 \uc774\ub984\uacfc \ube44\ubc00\ubc88\ud638\ub97c \uc785\ub825\ud558\ub294 \uad8c\ud55c \ubd80\uc5ec \ud615\uc2dd\uc785\ub2c8\ub2e4. \uae30\ubcf8 HTTP \uc778\uc99d\uc744 \uad6c\ud604\ud558\ub294 \uac83\uc740 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4\ub97c \uc81c\uc5b4\ud558\ub294 \uac00\uc7a5 \uac04\ub2e8\ud55c \ubc29\ubc95\uc785\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; HMAC<\/strong><\/p>\n<p>HMAC\ub294 \ub514\uc9c0\ud138 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998\uc744 \ud1b5\ud574 \uba54\uc2dc\uc9c0\ub97c \uc778\uc99d\ud558\ub294 \ucf54\ub4dc \uae30\ubc18\uc758 \uad8c\ud55c \ubd80\uc5ec \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4. HMAC\uc740 \ubcf4\uc548 \ud0a4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uad8c\ud55c\uc774 \ubc1c\uc2e0\uc790\uc640 \uc218\uc2e0\uc790\ub9cc \uac00\uc9c0\uace0 \uc788\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>&#8211; OAuth<\/strong><\/p>\n<p>OAuth\ub294 \uc0ac\uc6a9\uc790\uac00 \ube44\ubc00\ubc88\ud638\ub97c \uc81c\uacf5\ud558\uc9c0 \uc54a\uace0\ub3c4 \uc778\ud130\ub137 \uc0ac\uc6a9\uc790\uac00 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8 \uc815\ubcf4\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\ub294 \uad8c\ud55c \ubd80\uc5ec \ud615\uc2dd\uc785\ub2c8\ub2e4.<\/p>\n<p>OAuth\ub294 \uc544\ub9c8\uc874, \uad6c\uae00, \ud398\uc774\uc2a4\ubd81 \ubc0f \ub9c8\uc774\ud06c\ub85c\uc18c\ud504\ud2b8\uc640 \uac19\uc740 \ub9ce\uc740 \ub300\uae30\uc5c5\uc5d0\uc11c \uc801\uc6a9\ud558\ub294 \ud615\uc2dd\uc73c\ub85c, \uc0ac\uc6a9\uc790\uac00 \ud0c0\uc0ac \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uacfc \uacc4\uc815 \uc815\ubcf4\ub97c \uad50\ud658\ud560 \uc218 \uc788\uac8c \ub3c4\uc640\uc90d\ub2c8\ub2e4.<\/p>\n<h2><strong>4. Authentication vs Authorization \uad6c\ubcc4<\/strong><\/h2>\n<div id=\"attachment_13699\" style=\"width: 880px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13699\" class=\"wp-image-13699 size-full\" src=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163418\/Authentication6.jpg\" alt=\"Distinguish between Authentication vs Authorization\" width=\"870\" height=\"400\" \/><p id=\"caption-attachment-13699\" class=\"wp-caption-text\"><strong>\uc778\uc99d(Authentication)\uacfc \uad8c\ud55c \ubd80\uc5ec(Authorization)\ub294 \uc644\uc804\ud788 \ub2e4\ub978 \ub450 \uc778\uc99d \ud504\ub85c\uc138\uc2a4\uc785\ub2c8\ub2e4.<\/strong> \ucd9c\ucc98: ssl2buy.com<\/p><\/div>\n<p>Authentication (\uc778\uc99d)\uacfc Authorization (\uad8c\ud55c \ubd80\uc5ec)\uc740 \uc885\uc885 \ud63c\ub3d9\ub418\ub294 \ub450 \uc6a9\uc5b4\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\ub4e4\uc740 \uc644\uc804\ud788 \ub2e4\ub978 \uac1c\ub150\uc73c\ub85c, \uba87 \uac00\uc9c0 \ucc28\uc774\uc810\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ucc28\uc774\uc810\uc740 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4:<\/p>\n<table style=\"width: 95.6075%; height: 202px;\">\n<tbody>\n<tr style=\"height: 42px;\">\n<td style=\"text-align: center; height: 42px; width: 49.5998%;\"><strong>Authentication<\/strong><\/td>\n<td style=\"text-align: center; height: 42px; width: 57.4076%;\"><strong>Authorization<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 41px;\">\n<td style=\"height: 41px; width: 49.5998%;\">\uc778\uc99d\uc740 \uad8c\ud55c \ubd80\uc5ec\uc758 \uccab \ubc88\uc9f8 \ub2e8\uacc4\uc785\ub2c8\ub2e4.<\/td>\n<td style=\"height: 41px; width: 57.4076%;\">\uad8c\ud55c \ubd80\uc5ec\ub294 \uc131\uacf5\uc801\uc778 \uc778\uc99d \uc774\ud6c4\uc758 \ub2e8\uacc4\uc785\ub2c8\ub2e4.<\/td>\n<\/tr>\n<tr style=\"height: 57px;\">\n<td style=\"height: 57px; width: 49.5998%;\">\uc778\uc99d\uc740 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0 \uc561\uc138\uc2a4 \uad8c\ud55c\uc744 \ubd80\uc5ec\ud558\uae30 \uc704\ud574 \uc2e0\uc6d0\uc744 \ud655\uc778\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/td>\n<td style=\"height: 57px; width: 57.4076%;\">\uad8c\ud55c \ubd80\uc5ec\ub294 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0 \ud3ec\ud568\ub41c \ub9ac\uc18c\uc2a4\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4 \uad8c\ud55c\uc744 \uc815\uc758\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"height: 52px; width: 49.5998%;\">\ubcf4\ud1b5 \uc0ac\uc6a9\uc790 \uc774\ub984\uacfc \ube44\ubc00\ubc88\ud638\uac00 \ud544\uc694\ud569\ub2c8\ub2e4.<\/td>\n<td style=\"height: 52px; width: 57.4076%;\">\ubcf4\uc548\uc5d0 \ub530\ub77c \ub2e4\uc591\ud55c \uc778\uc99d \uc694\uc18c\uac00 \ud544\uc694\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/td>\n<\/tr>\n<tr style=\"height: 10px;\">\n<td style=\"height: 10px; width: 49.5998%;\">\uc778\uc99d\uc774 \ud45c\uc2dc\ub418\uba70 \uc0ac\uc6a9\uc790\uac00 \ud574\ub2f9 \ubd80\ubd84\uc744 \ubcc0\uacbd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/td>\n<td style=\"height: 10px; width: 57.4076%;\">\uad8c\ud55c \ubd80\uc5ec\ub294 \ud45c\uc2dc\ub418\uc9c0 \uc54a\uc73c\uba70 \ubcc0\uacbd\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>\uacb0\ub860\uc801\uc73c\ub85c,<\/strong><\/h2>\n<p>\uc778\uc99d\uacfc \uad8c\ud55c \ubd80\uc5ec\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubcf4\uc548\uc758 \ub450 \uc911\uc694\ud55c \uce21\uba74\uc785\ub2c8\ub2e4. \uc778\uc99d\uc740 \uc0ac\uc6a9\uc790 \uc2e0\uc6d0\uc744 \ud655\uc778\ud558\uba70, \uad8c\ud55c \ubd80\uc5ec\ub294 \uc561\uc138\uc2a4\ub97c \uc81c\uc5b4\ud569\ub2c8\ub2e4. \uc774 \ub450 \uc694\uc18c\uc758 \uc720\uc5f0\ud55c \uc870\ud569\uc740 \uae30\uc5c5\uc774 \uc2dc\uc2a4\ud15c \ubb34\uacb0\uc131\uacfc \uc548\uc804\uc744 \ubcf4\uc7a5\ud558\uace0 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c \ud658\uacbd\uc744 \uc870\uc131\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/p>\n<p>\ud604\uc7ac BAP \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub294 \uace0\uac1d\uc5d0\uac8c \uace0\ud488\uc9c8\uc758 \uae30\uc220 \uc81c\ud488\uc744 \uc81c\uacf5\ud558\ub294 \uc2e0\ub8b0\uc131 \uc788\ub294 \uc815\ubcf4 \uae30\uc220 \uc11c\ube44\uc2a4 \ud68c\uc0ac \uc911 \ud558\ub098\uc785\ub2c8\ub2e4. \uc9c0\uc6d0 \ubc0f \uc870\uc5b8\uc774 \ud544\uc694\ud55c \uacbd\uc6b0 BAP \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc5d0 \uc989\uc2dc \uc5f0\ub77d\ud558\uc2ed\uc2dc\uc624! \uc6b0\ub9ac\ub294 \ud56d\uc0c1 24\/24 \uc9c0\uc6d0\uc744 \uc81c\uacf5\ud560 \uc900\ube44\uac00 \ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"author":25,"featured_media":13696,"template":"","meta":{"_acf_changed":false},"tags":[],"blog-cat":[2058],"class_list":["post-13684","knowledge","type-knowledge","status-publish","has-post-thumbnail","hentry","blog-cat-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83 - \uc9c0\uc2dd<\/title>\n<meta name=\"description\" content=\"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83\" \/>\n<meta property=\"og:description\" content=\"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/\" \/>\n<meta property=\"og:site_name\" content=\"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bap32\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T07:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"801\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@bapsoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/\",\"url\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/\",\"name\":\"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83 - \uc9c0\uc2dd\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2024\\\/02\\\/06163405\\\/Authentication3.png\",\"datePublished\":\"2024-02-14T01:54:30+00:00\",\"dateModified\":\"2024-05-30T07:19:00+00:00\",\"description\":\"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/#breadcrumb\"},\"inLanguage\":\"kr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"kr\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.bap-software.net\\\/2024\\\/02\\\/06163405\\\/Authentication3.png\",\"contentUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2024\\\/02\\\/06163405\\\/Authentication3.png\",\"width\":801,\"height\":446,\"caption\":\"Session-based Authentication\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/authentication-vs-authorization-in-software-development\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge\",\"item\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/knowledge\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/#website\",\"url\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/\",\"name\":\"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bap-software.net\\\/kr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"kr\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83 - \uc9c0\uc2dd","description":"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/","og_locale":"en_US","og_type":"article","og_title":"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83","og_description":"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95","og_url":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/","og_site_name":"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9","article_publisher":"https:\/\/www.facebook.com\/bap32","article_modified_time":"2024-05-30T07:19:00+00:00","og_image":[{"width":801,"height":446,"url":"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@bapsoftware","twitter_misc":{"Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/","url":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/","name":"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83 - \uc9c0\uc2dd","isPartOf":{"@id":"https:\/\/bap-software.net\/kr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/#primaryimage"},"image":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png","datePublished":"2024-02-14T01:54:30+00:00","dateModified":"2024-05-30T07:19:00+00:00","description":"\uc694\uc998\uc5d0\ub294 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc774 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\uace0 \ub9ce\uc740 \uc815\ubcf4 \ubcf4\uc548 \uc704\ud611\uc774 \uc874\uc7ac\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ud2b8\ub80c\ub4dc\ub97c \ub530\ub77c\uac00\uae30 \uc704\ud574, \uc778\uc99d \ub300 \uad8c\ud55c \uba54\ucee4\ub2c8\uc998\uc774 \ud0c4\uc0dd\ud558\uc5ec \uc774 \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uace0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.1. \uc778\uc99d\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \uc778\uc99d \ubc29\ubc95","breadcrumb":{"@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/#breadcrumb"},"inLanguage":"kr","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/"]]}]},{"@type":"ImageObject","inLanguage":"kr","@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/#primaryimage","url":"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png","contentUrl":"https:\/\/cdn.bap-software.net\/2024\/02\/06163405\/Authentication3.png","width":801,"height":446,"caption":"Session-based Authentication"},{"@type":"BreadcrumbList","@id":"https:\/\/bap-software.net\/kr\/knowledge\/authentication-vs-authorization-in-software-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bap-software.net\/kr\/"},{"@type":"ListItem","position":2,"name":"Knowledge","item":"https:\/\/bap-software.net\/kr\/knowledge\/"},{"@type":"ListItem","position":3,"name":"\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uc5d0\uc11c \uc778\uc99d \ub300 \uad8c\ud55c\uc5d0 \uad00\ud55c \ubaa8\ub4e0 \uac83"}]},{"@type":"WebSite","@id":"https:\/\/bap-software.net\/kr\/#website","url":"https:\/\/bap-software.net\/kr\/","name":"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bap-software.net\/kr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"kr"}]}},"_links":{"self":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/knowledge\/13684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/knowledge"}],"about":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/types\/knowledge"}],"author":[{"embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/users\/25"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/media\/13696"}],"wp:attachment":[{"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/media?parent=13684"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/tags?post=13684"},{"taxonomy":"blog-cat","embeddable":true,"href":"https:\/\/bap-software.net\/kr\/wp-json\/wp\/v2\/blog-cat?post=13684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}