Resources Categorized: Authentication

There are a total of (25) items.
Role-Based Access Control (RBAC)
RBAC (Role-Based Access Control) is a method of regulating access to computer systems and resources based on the roles of individual users within an organization. In RBAC, users are assigned to specific roles, and access to systems and resources is granted based on these roles. The main advantage of RBAC is that it allows organizations to manage access control in a more granular and flexible way.
Security Assertion Markup Language (SAML)
SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between parties, specifically between an identity provider (IdP) and a service provider (SP). It is used for single sign-on (SSO) and identity federation, allowing users to securely access multiple applications with one set of credentials. In a SAML SSO scenario, the user au
OpenID Connect (OIDC)
OIDC (OpenID Connect) is a standard for secure authentication that enables the exchange of authentication and authorization data between identity providers (IdPs) and client applications. It is an open, standards-based protocol for secure, single sign-on (SSO) authentication that is built on top of OAuth 2.0. OIDC provides a secure and standardized way for users to log into client applications usi
2FA Authenticator
A 2FA (Two-Factor Authentication) authenticator is a software-based security tool that generates one-time codes for use in two-factor authentication processes. 2FA authenticators are typically used in conjunction with passwords to provide an additional layer of security and protection against unauthorized access to online accounts and systems. 2FA authenticators work by generating unique codes tha
WebAuthn
WebAuthn is a web standard for secure authentication . It is a passwordless authentication method that enables users to securely log into web services using a compatible security key, biometric authentication, or a trusted device. WebAuthn is based on public-key cryptography, which provides a secure way to authenticate users without relying on passwords. It enables users to create a cryptographic
Blog
Authn vs. Authz — Authentication vs. Authorization
Blog
The Move to Passwordless Authentication
Previous Page 3 of 3 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved