Zero-Knowledge Proofs: A Beginner's Guide
Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...
Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...
iDIN is an electronic identity used in the Netherlands. It stands for “Identity and Login.” iDIN is provided by a collaboration of Dutch banks...
In this tutorial, we’ll create a minimal implementation of Twilio’s Voice API along with Swedish BankID in telephone calls to demonstrate simple and...
Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...
Passkeys are a new kind of login credentials that entirely replace passwords.
Verifiable Credentials are changing the digital identity space and will soon become part of our daily lives.
As you learn more about identity management and the wallet ecosystem, you’ll come across concepts related to verifiable credentials. This terminology...
JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...
Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.
Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...
Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...
User journeys often start with the login page. Yet when it comes to design and user experience, this critical element can get overlooked.
Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...
User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...
What is biometric authentication? Biometric authentication is a security measure that requires people to verify their identity by providing a unique...
Electronic transactions and payments have become an increasingly common part of our daily lives. But at the same time, online users face the...
Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...
Authentication is the process of proving that an individual is who they say they are. In the digital world, this often involves granting users access...
OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...
The use of biometrics online helps us understand who people are and what their true identity is. Biometrics is an efficient and secure way to...
Over the years, an increasing number of countries have adopted eID as a way for citizens to verify themselves online. Your customers’ eID is perhaps...
Implementing electronic identities (eIDs) in your site or app as a method of login is important in order to create a secure authentication experience...
Stay up to date on industry news and insights