Tag: Oauth
-
OPEN ID & Oauth
OPEN ID & Oauth works hand in hand. To let the end user access the data the identification of the user has to be done, the identification process will require email or phone number as primary keys, and other supporting details like name, city, etc as supporting data points to ensure that the right user is identified via OPEN ID…
-
Auth Strategy: Infra Security POV
An authentication strategy is the cornerstone of infrastructure security, serving as the first line of defense against unauthorized access and data breaches. By validating the identity of users, devices, or systems attempting to access resources, a robust authentication strategy ensures the integrity, confidentiality, and availability of critical assets. This article explores advanced authentication mechanisms, their…