Implementing authentication

Last updated