4.3. Token-Based Authentication Visual Notes | Information Security BIT | TU | TABFlux