Authentication Ensuring the user is who they say they are. Options include: Passwordless login (authenticator app, biometrics, passkeys) Username and password; simplest to implement but most vulnerable OTP (sms, email); danger of sim swap attacks,...
discovertech.hashnode.dev3 min readNo responses yet.