...

/

- Access Control

- Access Control

Vulnerabilities and precautions for using Cloud Functions.

Security

The Cloud Functions we introduced in this chapter are open to the web, which means that anyone can access them and potentially abuse the endpoints.

In general, it’s best not to enable unauthenticated access and instead lock down the function so that only authenticated users and services can access them. This ...

svg viewer