Research the different auth methods and pick one that is suitable for the system, ie JSON web tokens or similar.