Authentication

Overview

This section contains recommendations for the implementation of authentication mechanisms.

Reuse existing authentication mechanisms to avoid duplication and attack surface expansion.

General practices

Authentication schemeProof of identityPages

Authentication with login and password

login & password

Authentication with email and password

email & password

Authentication with a phone number and an one-time code

phone number & one-time password

OAuth2 authentication

third-party system

Multi-factor authentication

one time password

Last updated