Mapping Identity
Learn about the methods of mapping a person, place, or thing to a software resource in a verifiable manner.
This free ebook is the only primer you need to understand identity in modern applications, why access security is crucial and how to work with trust systems.
Learn how identity technology is constantly evolving to keep up with modern software development. Understand how systems of trust play a role in creating secure apps and systems.
Learn about the methods of mapping a person, place, or thing to a software resource in a verifiable manner.
Explore real-world examples of authentication methods and best practices.
Understand authentication, authorization, the differences, and why every method has its flaws.
Learn more about the differences between single-factor and multifactor authentication.