Authentication is the first gate in any secure system. Before we decide what you can access, we need to know who you are. In this deep dive, we'll explore how authentication actually works — from passwords and hashing to MFA, session tokens, and passwordless login.
Identity & Access Management
May 11, 2020
Identity & Access Management
Who are you — and what are you allowed to do? That's the fundamental question every secure system must answer. And it's exactly what Identity and Access Management (IAM) is built to solve.
Apr 08, 2020
Identity & Access Management
Access control is one of the most fundamental concepts in security. Every time you set file permissions, assign user roles, or restrict access to a resource, you're implementing some form of access control. But not all access control is created equal...