Authentication
validates the identity of a user who is accessing the system to see if that end
user has valid credentials. A quick view of some of the ways to Authenticate
- Forms Authentication
- Basic Authentication
- Digest Authentication
- Windows Authentication
- Preshared Key or API Key-Based Authentication:
Use API keys if you have to build internal application that don't need to
access more than single user's data.
- X.509 Client Certificate-Based
Authentication
- SWT-Based Authentication and
Authorization
- JWT-Based Authentication and
Authorization
- Google Authenticator OTP-Based
Authentication
- OAuth 2.0 Access Token-Based
Authentication and Authorization: OAuth has been designed for use
with applications on the internet, primarily for delegated authorization
of internet resources. OAuth is designed for Internet Scale
- SMS-Delivered OTP-Based
Authentication
- SAML Token-Based Authentication
and Authorization : SAML was designed to be applicable openly, it is
typically used in Enterprise SSO scenarios
- within
an enterprise or
- enterprise
to partner or
- Enterprise
to cloud scenarios.
No comments:
Post a Comment