architecture SSO – Single Sign On (1 of 2) SSO – Single Sign On is a technology that allows users to access multiple applications or services with one set Read More
architecture JSON Web Token (JWT) JSON Web Token (JWT) is an open standard that defines a compact and self-contained way for securely transmitting information between Read More
architecture Asymmetric Encryption Asymmetric Encryption is a cryptographic technique that allows two parties to communicate securely without sharing a secret key. Read More
architecture Symmetric Encryption Symmetric Encryption is a method of encrypting and decrypting data using the same secret key. Read More
architecture Digital Signature Digital Signature is a cryptographic technique that verifies the authenticity and integrity of a message, document, or transaction. Read More
architecture Certificate-based authentication Certificate-based authentication is a way of verifying the identity of a user or a server based on public key cryptography. Read More
architecture Token-Based Authentication Token-Based Authentication is a method of authentication that relies on the use of tokens to grant access to resources. Read More
architecture Biometric Authentication Biometric authentication is the process of verifying the identity of a person based on their biological or behavioral characteristics. Read More
architecture Multi-Factor Authentication (MFA) Multi-factor authentication (MFA) is a security method that requires users to provide more than one piece of evidence to verify Read More
architecture Password Based Authentication Password Based Authentication is a method of verifying the identity of users who want to access a system or a Read More