4.3. Token-Based Authentication Notes | Information Security BIM | TU | TABFlux