We are going to start this section by telling you that Authentication or Broken Authentication is the second most critical vulnerability as per OWASP Top 10 list.
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. -OWASPYou can read more about OWASP here: OWASP Top Ten
In this section we are going to cover the most important aspects about Authentication. You'll find in here: