Authentication: System will need to ensure client and server are authenticated before accessing sensitive data (e.g: passwords). One method would be to pass auth-tokens on each request. Authorization: ...