Authentication Survival Guide
By Auth0
Added
This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.
Tags
Web browser Credentials CSRF 3rd party services Endpoint Threat actor Web application Application security Boundary defense Business applicationTopic Map
