Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Broken authentication

Common tactics attackers use to steal user identities and what you can do to stop them.

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Latest Posts

What is Open Authorization (OAuth 2.0)?

What Is Attribute-Based Access Control (ABAC)?

Read More >

Authentication basics |

MFA fatigue LC thumbnail

What Is MFA Fatigue & How to Prevent It

Read More >

Broken authentication |

YubiKey authentication LC thumbnail

What is YubiKey Authentication & How It Works

Read More >

Authentication methods |

WebAuthn 101: How Web Authentication Works

Strong Authentication: What It Is and Why You Need It

Read More >

Authentication basics |

What is authentication thumbnail

Different Authentication Methods & Choosing the Right One

Read More >

Authentication methods |

MITM attacks thumbnail image

MFA Bypass Explained & How to Prevent It

Read More >

Broken authentication |