Authentication
Overview
This section contains recommendations for the implementation of authentication mechanisms.
Reuse existing authentication mechanisms to avoid duplication and attack surface expansion.
General practices
Authentication scheme | Proof of identity | Pages |
---|---|---|
Authentication with login and password |
| |
Authentication with email and password |
| |
Authentication with a phone number and an one-time code |
| |
OAuth2 authentication |
| |
Multi-factor authentication |
|
Last updated