Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Broken authentication

Be aware of the tactics attackers use to steal user identities and what you can do to stop them.

Learn More

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Learn More

Authentication methods

Primers on common passwordless authentication methods and how they work.

Learn More

Latest Posts

WebAuthn 101: How Web Authentication Works

WebAuthn 101: How Web Authentication Works

Read More >

Authentication protocols & standards |

Code Preview

Broken Authentication 101

Read More >

Broken authentication |

What is biometric authentication?

What is Biometric Authentication?

Read More >

Authentication methods |

What is FIDO2? How does FIDO authentication work?

What is FIDO2? How Does FIDO Authentication Work?

Read More >

Authentication protocols & standards |

What is a brute force attack?

What is a Brute Force Attack?

Read More >

Broken authentication |

Passwordless Authentication 101: Why It Matters

Passwordless Authentication 101: Why It Matters

Read More >

Authentication methods |