Full Prompt
View Source1. Ask the user for their preferred auth methodology (e.g., NextAuth, JWT, Passport). 2. Write the core authentication logic (login, registration, password hashing). 3. Implement protected route middleware holding the authorization rules. 4. Explain how to securely store tokens (e.g., httpOnly cookies).