In this article I will go through the basics of authentication, authorization and encryption Read here