Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Broken authentication

Common tactics attackers use to steal user identities and what you can do to stop them.

Learn More

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Learn More

Authentication methods

Primers on common passwordless authentication methods and how they work.

Learn More

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Learn More

Latest Posts

WebAuthn 101: How Web Authentication Works

WebAuthn 101: Definition, How It Works & Benefits

Read More >

Authentication protocols & standards |

What is Open Authorization (OAuth 2.0)?

User Provisioning: Definition, How It Works & Best Practices

Read More >

Authentication basics |

MITM attacks thumbnail image

Session Hijacking Explained & How to Prevent It

Read More >

Broken authentication |

What is Open Authorization (OAuth 2.0)?

What Is Attribute-Based Access Control (ABAC)?

Read More >

Authentication basics |

MFA fatigue LC thumbnail

What Is MFA Fatigue & How to Prevent It

Read More >

Broken authentication |

YubiKey authentication LC thumbnail

What is YubiKey Authentication & How It Works

Read More >

Authentication methods |