You have a lot of options to choose from when laying out an authorization structure for mobile applications that communicate with a web API. For basic scenarios with low to medium security requirements, here is a simple strategy.
↧