James must implement a form of authentication using tokens, pass them to the client, and use the token as a means of authentication.