Identipedia

Customer identity and user authentication concepts, explained. Whether you’re just getting into the authentication world or have been here since it began, this is meant for you.

search icon

Explore Topics

Authentication basics

Learn the basic definitions and market terms you will need on your authentication journey.

Authentication methods

Primers on common passwordless authentication methods and how they work.

Authentication protocols & standards

Your one-stop introduction to authentication protocols and standards, their strengths and gaps, and when to use them.

Broken authentication

Be aware of the tactics attackers use to steal user identities and what you can do to stop them.

Latest Posts

Bot attacks LC thumbnail

What Are Bot Attacks (and How To Mitigate Them)

Read More >

Broken authentication |

Passwordless Authentication 101: Why It Matters

Passwordless Authentication 101: Why It Matters

Read More >

Authentication methods |

What is a one-time password (OTP)?

OTP Authentication Explained: Definition, Uses & B...

Read More >

Authentication methods |

MFA fatigue LC thumbnail

What Is Facial Recognition and How It Works

Read More >

Authentication methods |

Phishing resistant MFA thumbnail

What Is Multi-Factor Authentication (MFA)?

Read More >

Authentication methods |

Adaptive authentication LC thumbnail

What Is Adaptive Authentication (and When to Use I...

Read More >

Authentication methods |