Identity, authentication, and authorisation from the ground up
blog.koodos.com
In an earlier post we learnt the basic concepts of identity, authentication, and authorisation — important terms that are easily confused by hackers and technologists. In this post we will dive deeper and demystify how apps actually implement authentication. Do it right, and you barely notice it. But do it wrong, and you lock users out or open major security holes.
Identity, authentication, and authorisation from the ground up
Identity, authentication, and authorisation…
Identity, authentication, and authorisation from the ground up
In an earlier post we learnt the basic concepts of identity, authentication, and authorisation — important terms that are easily confused by hackers and technologists. In this post we will dive deeper and demystify how apps actually implement authentication. Do it right, and you barely notice it. But do it wrong, and you lock users out or open major security holes.