architecture ABAC – Attribute Based Access Control ABAC – Attribute Based Access Control is a type of access control model that uses attributes to determine whether a Read More
architecture SSO – Single Sign On (1 of 2) SSO – Single Sign On is a technology that allows users to access multiple applications or services with one set Read More
architecture JSON Web Token (JWT) JSON Web Token (JWT) is an open standard that defines a compact and self-contained way for securely transmitting information between Read More
architecture Asymmetric Encryption Asymmetric Encryption is a cryptographic technique that allows two parties to communicate securely without sharing a secret key. Read More
architecture Certificate-based authentication Certificate-based authentication is a way of verifying the identity of a user or a server based on public key cryptography. Read More
architecture Token-Based Authentication Token-Based Authentication is a method of authentication that relies on the use of tokens to grant access to resources. Read More
architecture Biometric Authentication Biometric authentication is the process of verifying the identity of a person based on their biological or behavioral characteristics. Read More
architecture Multi-Factor Authentication (MFA) Multi-factor authentication (MFA) is a security method that requires users to provide more than one piece of evidence to verify Read More
architecture Authentication Types Authentication Types there are several ways to perform authentication Read More