Generating the User Model
Generate the User model of the application.
In the last chapter, we managed to set up the bare bones for our application’s endpoints configuration.
In the next chapter, we will handle user authentication through authentication tokens and set permissions to limit access for, let’s say, signed-in users.
In the coming chapters, we will relate products to users and give them the ability to place orders. ...
Get hands-on with 1400+ tech skills courses.