Strong authentication
NIS 2 and DORA: CLM solutions to support compliance
White paper: OpenID Connect and OAuth – The authorization and authentication protocols
Before OpenID Connect and SAML, information systems relied on simple authentication, which was hard to maintain and could lead to various security vulnerabilities. OpenID Connect and OAuth are the new security best practices to handle authentication and authorization, respectively. Before OAuth, applications had to manage by themselves authentication and single sign on. But with the advance of smartphones, applications had to authenticate users on […]
Lire PlusStrong authentication: a key element of digital trust
Along with digital identity, authentication is one of the pillars of digital trust. It involves certifying the identity of a person or machine so they can access a service or resource. Let’s take a look at the different […]
Lire Plus