Skip to main content

Authentication Strategies

 Basic Authentication

JSON Web Tokens
Open Authorization
Session Based Authentication
Single Sign On
Token Based Authentication
Source: Internet Articles

Comments

Popular posts from this blog

Code Review Pyramid

 Code Review Pyramid