Authentication
Last updated
Last updated
This section contains recommendations for the implementation of authentication mechanisms.
Authentication with login and password
login
& password
Authentication with email and password
email
& password
Authentication with a phone number and an one-time code
phone number
& one-time password
OAuth2 authentication
third-party system
Multi-factor authentication
one time password