In this chapter, we discussed some ways of providing access to your application and other ways of restricting access to it. You can use authentication to verify a user's identity while you can use authorization to enable access to specific parts of the application. You can protect small bits of data using the new data protection system, while you can take several different actions to protect your application from well-known security risks.
In the next and final chapter we will cover the process of deployment. A web application is no good if it only sits in your development environment. By deploying your application to a public website, you can reach a global audience. By deploying to the cloud, you can scale your website to meet public demand.