Authentication

Overview

This section contains recommendations for the implementation of authentication mechanisms.

circle-info

Reuse existing authentication mechanisms to avoid duplication and attack surface expansion.

General practices

Authentication scheme
Proof of identity
Pages

Authentication with login and password

login & password

Authentication with email and password

email & password

Authentication with a phone number and an one-time code

phone number & one-time password

OAuth2 authentication

third-party system

Multi-factor authentication

one time password

Last updated