Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Broken authentication

Be aware of the tactics attackers use to steal user identities and what you can do to stop them.

Latest Posts

What are magic links and how do they work?

What Are Magic Links and How Do They Work?

Read More >

Authentication methods |

Passwordless Authentication 101: Why It Matters

What Is Passwordless Authentication & How It Works

Read More >

Authentication methods |

What is Open Authorization (OAuth 2.0)?

Progressive Profiling 101: Right User Info at the Right Time

Read More >

Authentication basics |

What is Open Authorization (OAuth 2.0)?

What Is Authorization and How Does It Work?

Read More >

Authentication basics |

Authentication server thumbnail

What Is an Identity Provider (IdP) & How Does It Work?

Read More >

Authentication basics |

What is Open Authorization (OAuth 2.0)?

Fine-Grained Authorization 101: When to Use FGA

Read More >

Authentication basics |