Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Broken authentication

Common tactics attackers use to steal user identities and what you can do to stop them.

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Latest Posts

What is Open Authorization (OAuth 2.0)?

What Is OIDC & How It Works

Read More >

Authentication protocols & standards |

WebAuthn 101: How Web Authentication Works

Customer Identity and Access Management (CIAM) 101

Read More >

Authentication basics |

MITM attacks thumbnail image

What Is Session Fixation & How to Prevent It

Read More >

Broken authentication |

What is Open Authorization (OAuth 2.0)?

What Is SCIM & How It Works

Read More >

Authentication protocols & standards |

What is Security Assertion Markup Language (SAML)?

What Is IDaaS & How to Choose the Right One

Read More >

Authentication basics |

What is Security Assertion Markup Language (SAML)?

What Is SSO & How It Works

Read More >

Authentication methods |