Authorization and authentication « Server-Side Request Forgery (SSRF): When Convenience Becomes a Security NightmareBasic User Authentication Strategies »