The Baeldung logo
  • The Baeldung LogoCS Sublogo
  • Start Here
  • About ▼▲
    • Full Archive

      The high level overview of all the articles on the site.

    • About Baeldung

      About Baeldung.

Security » Authentication

The security aspects of an application are a critical issue to tackle. Learn about general security principles such as authentication, authorization, certificates, and hashing.

  • Security Attacks (46)
  • Cryptography (25)
  • x Authentication (18)
  • Malware (16)
  • Hashing (7)
  • HTTP (6)
  • Routing (5)
  • Firewalls (5)
  • TCP (4)
  • Error Detection (3)
  • URL (3)
  • Distributed Systems and Programming (3)
  • HTTPS (3)
  • Blockchain (2)
  • Databases (2)
  • Project Management (2)
  • Virtual Private Networks (2)

>> Popular Authentication Methods for Web Apps

>> How Do ID Tokens Work?

>> Deauthentication Attacks

>> Security: a Brief Review of Claims-Based Authentication

>> What Are Impersonation Attacks?

>> Basics of One-time Passwords

>> Understanding Passkeys

>> Security: Credential Stuffing vs. Password Spraying

>> Hash vs. Message Authentication Code

  • Hashing

>> Private URLs vs. Password-based Authentication

>> Security: What Is the CIA Triad?

>> Difference Between Self-Signed CA and Self-Signed Certificate

>> Authentication: Multi-Step vs. Multi-Factor

>> Introduction to SAML

>> API Authentication – Tokens vs Sessions

>> Authentication vs Authorization

>> SSL vs. SSH

>> Guide to Single Sign-On (SSO)

  • ↑ Back to Top
The Baeldung logo

Categories

  • Algorithms
  • Artificial Intelligence
  • Core Concepts
  • Data Structures
  • Graph Theory
  • Latex
  • Networking
  • Security

Series

About

  • About Baeldung
  • The Full archive
  • Editors
  • Terms of Service
  • Privacy Policy
  • Company Info
  • Contact
The Baeldung Logo