Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Broken authentication

Common tactics attackers use to steal user identities and what you can do to stop them.

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Latest Posts

What is Security Assertion Markup Language (SAML)?

What Is SSO & How It Works

Read More >

Authentication methods |

What is a JWT thumbnail image

What Is a JWT & How It Works

Read More >

Authentication protocols & standards |

Guide to auth protocols thumbnail image

What Is Session Management & Tips to Do It Securely

Read More >

Authentication basics |

What is credential stuffing?

Credential Stuffing Explained + How to Prevent It

Read More >

Broken authentication |

Token-based auth thumbnail

What Is Token-Based Authentication & How It Works

Read More >

Authentication basics |

What is Security Assertion Markup Language (SAML)?

Enterprise SSO: A Comprehensive Guide

Read More >

Authentication methods |