Original article: https://www.openidentityplatform.org/blog/adaptive-authentication

Introduction

Your applications will be attacked sooner or later. Especially if they have become popular and your users don’t particularly care about information security.

In my 10 years of developing authentication systems, I’ve seen a constant battle between security requirements and a positive user experience. The easier it…


Original article https://www.openidentityplatform.org/blog/login-password-authentication

Introduction

The following article is intended for newbies, who want to develop authentication for their services. In the article, we will look at the most common authentication method — login and password authentication, its implementation, advantages, and disadvantages.

Authentication is an identity verification process. For software, authentication is…


Original Article: https://www.openidentityplatform.org/blog/passwordless-authentication-methods

Intro

Nowadays, people use more and more different online services in everyday life, and each service requires authentication. So, for each service, you need to remember your username and password. And, even the login for each service can be the same (for example, the email), then the password…


Introduction

This is an introductory article for those who are just diving into the problem of protecting enterprise applications and services. It explains the basic concepts related to access control, what is the access control, for which it is necessary, how it works.

Basic Concepts

Authentication — a process designed to verify the…


Motivation

Kerberos authentication allows users to authenticate seamlessly to trusted sites. If users already authenticated in a corporate network, there is no need to authenticate to other applications. They just use previously entered credentials. In this article, we will set up Kerberos authentication with your application in several minutes. …


Original article: https://www.linkedin.com/pulse/how-implement-adaptive-authentication-using-machine-learning-thomas/

Introduction

Machine learning is more and more widely used in our lives and its applications become wider — machine learning helps us to make decisions, detect hidden patterns and also identify various types of anomalies. Machine learning is used in various industries — in medicine for more precise…


Nowadays, Internet services are evolving rapidly and amount of everyday using services are growing up exponentially. Some services we start to use, some of them we abandon. Yesterday we used ICQ and Hotmail, nowadays we use Slack, Gmail and Snapchat, tomorrow we will use next-generation services. Internets services help us…

Maxim Thomas

Open Identity Community member, OSS Enthusiast

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store