Multi-Factor Authentication: Definition, Use Cases, and Benefits
Traditional single-factor authentication methods, such as usernames and passwords, are increasingly vulnerable to cyberattacks. Multi-Factor...
What are the next steps for digital wallets in Europe? On November 13th, 2024, we hosted our live conference, Criipto Connect, at Bremen Teater in...
Traditional single-factor authentication methods, such as usernames and passwords, are increasingly vulnerable to cyberattacks. Multi-Factor...
Passkeys are a new kind of login credentials that entirely replace passwords.
Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...
Authentication is the process of proving that an individual is who they say they are. In the digital world, this often involves granting users access...
Biometric authentication is a security measure that requires people to verify their identity by providing a unique biometric feature. The word...
Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...
iDIN is an electronic identity used in the Netherlands. It stands for “Identity and Login.” iDIN is provided by a collaboration of Dutch banks...
In this tutorial, we’ll create a minimal implementation of Twilio’s Voice API along with Swedish BankID in telephone calls to demonstrate simple and...
Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...
Verifiable Credentials are changing the digital identity space and will soon become part of our daily lives.
As you learn more about identity management and the wallet ecosystem, you’ll come across concepts related to verifiable credentials. This terminology...
JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...
Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.
Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...
User journeys often start with the login page. Yet when it comes to design and user experience, this critical element can get overlooked.
Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...
User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...
Electronic transactions and payments have become an increasingly common part of our daily lives. But at the same time, online users face the...
Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...
OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...
The use of biometrics online helps us understand who people are and what their true identity is. Biometrics is an efficient and secure way to...
Over the years, an increasing number of countries have adopted eID as a way for citizens to verify themselves online. Your customers’ eID is perhaps...
Implementing electronic identities (eIDs) in your site or app as a method of login is important in order to create a secure authentication experience...
Stay informed with the latest news and insights on digital identity