Multi-Factor Authentication: Definition, Use Cases, and Benefits

Traditional single-factor authentication methods, such as usernames and passwords, are increasingly vulnerable to cyberattacks. Multi-Factor...

Passkeys: an Overview

Passkeys are a new kind of login credentials that entirely replace passwords.

eIDAS Levels of Assurance in Different National eID Schemes

Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...

What is Authentication? Factors, Types, and Examples

What is Authentication?

Authentication is the process of proving that an individual is who they say they are. In the digital world, this often involves granting users access...

Biometric Authentication: Everything You Need to Know

What is biometric authentication?

Biometric authentication is a security measure that requires people to verify their identity by providing a unique biometric feature. The word...

Zero-Knowledge Proofs: A Beginner's Guide

Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...

How to Get Started With iDIN: The Complete Guide

Getting Started with iDIN: The Complete Guide for Businesses

iDIN is an electronic identity used in the Netherlands. It stands for “Identity and Login.” iDIN is provided by a collaboration of Dutch banks...

How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID...

In this tutorial, we’ll create a minimal implementation of Twilio’s Voice API along with Swedish BankID in telephone calls to demonstrate simple and...

An Introduction to Client Initiated Backchannel Authentication (CIBA)

Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...

What Are SD-JWT-based Verifiable Credentials?

Verifiable Credentials are changing the digital identity space and will soon become part of our daily lives.

Verifiable Credentials Explained In Simple Terms

Verifiable Credentials: A Glossary (For Everyone)

As you learn more about identity management and the wallet ecosystem, you’ll come across concepts related to verifiable credentials. This terminology...

Understanding JWT Validation: A Practical Guide with Code Examples

JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...

How To Use Fiddler to Debug Authentication Flows

Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.

Use Cases for Address Registry Lookups: From Enhanced User Experience...

Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...

Introducing Custom HTML & CSS for Login Flows

Introducing Custom HTML & CSS for Login Flows

User journeys often start with the login page. Yet when it comes to design and user experience, this critical element can get overlooked.

Persistent User Identification with eIDs

Persistent User Identification with eIDs

Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...

User Authentication: Comparing Session-based and Token-based...

User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...

Strong Customer Authentication 101

Electronic transactions and payments have become an increasingly common part of our daily lives. But at the same time, online users face the...

Mapping eID claims to Auth0: Using Actions and Rules

Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...

JWT Claims in OpenID Connect: Real-world Example

OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...

3 customer benefits of using biometrics in digital authentication

The use of biometrics online helps us understand who people are and what their true identity is. Biometrics is an efficient and secure way to...

How to integrate eID authentication in your business

Over the years, an increasing number of countries have adopted eID as a way for citizens to verify themselves online. Your customers’ eID is perhaps...

3 reasons why eID is safer than a regular login

Implementing electronic identities (eIDs) in your site or app as a method of login is important in order to create a secure authentication experience...

Sign up for our newsletter

Stay informed with the latest news and insights on digital identity