Security
Mechanisms for Authentication
Single Sign-On (SSO)
Federated Identity
Kerberos
Based on 3A principle
Components of Kerberos
Cons of Kerberos
SAML 2.0
OAuth 2.0 & OpenID Connect
Blogs / Online Articles
JWT
Edge Services
Securing API
Blogs / Online Articles
Last updated