Authentication
Last updated
Last updated
This section contains recommendations for the implementation of authentication mechanisms.
Reuse existing authentication mechanisms to avoid duplication and attack surface expansion.
Authentication with login and password
login
& password
Authentication with email and password
email
& password
Authentication with a phone number and an one-time code
phone number
& one-time password
OAuth2 authentication
third-party system
Multi-factor authentication
one time password