Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Broken authentication

Be aware of the tactics attackers use to steal user identities and what you can do to stop them.

Latest Posts

What is session hijacking?

What is MFA Bypass and How to Prevent It

Read More >

Broken authentication |

What is authentication thumbnail

A Guide to User Authentication Methods

Read More >

Authentication methods |

Social login thumbnail

What is Social Login and How Does it Work?

Read More >

Authentication methods |

What is Open Authorization (OAuth 2.0)?

What is OpenID Connect (OIDC)?

Read More >

Authentication protocols & standards |

Passwordless Authentication 101: Why It Matters

Passwordless Authentication 101: Why It Matters

Read More >

Authentication methods |

Authenticator app thumbnail image

What is an Authenticator App?

Read More >

Authentication methods |