Identity, authentication and authorization protocols

By Susan Morrow, Contributor, CSO | DEC 5, 2019 3:00 AM PST Whether you host your authentication system internally or externally, you need to select an authentication protocol carefully. The correct protocol for your use case will allow the overall system to operate securely with minimal effort and enable future expansion and compatibility with standards. In addition, if you want […]