The post discusses the use of middleware for route protection and argues against its usage. It highlights the drawbacks of using middleware for authorization and suggests alternative approaches for implementing route protection based on user roles.

3m read timeFrom pilcrowonpaper.com
Post cover image
10 Comments

Sort: