About 225,000 results
Open links in new tab
  1. Microsoft identity platform app types and authentication flows

    Apr 14, 2025 · All of the architectures are based on the industry-standard protocols OAuth 2.0 and OpenID Connect. By using the authentication libraries for the Microsoft identity platform, applications …

  2. Authentication and Authorization Flows

    Learn about the various flows used for authentication and authorization of applications and APIs.

  3. Understanding Modern Web Authentication Flows: Session vs JWT vs …

    Oct 29, 2024 · Authentication is the process of confirming the identity of a user to access services within application. This article explores three popular authentication methods: Session-based …

  4. Ultimate Guide to Custom Authentication Flows

    Apr 15, 2025 · Learn how to create and optimize custom authentication flows for enhanced security and user experience with managed solutions.

  5. Building Secure Authentication Flows Architecturally

    Architecting secure authentication flows requires a holistic approach covering protocol selection, secure credential handling, token management, multi-factor authentication, and defense-in-depth against …

  6. OAuth Flows Explained: Types and When to Use Them | Frontegg

    Sep 16, 2023 · Learn about different OAuth flows, including authorization code, implicit, and more. Discover their use cases to secure user authentication.

  7. Authentication flows for different App types - NashTech Blog

    Nov 28, 2024 · Authentication flows are the backbone of app security, determining how users verify their identities and access resources. This guide explores various app types and their corresponding …

  8. Understanding User Authentication Flows: A Comprehensive Guide

    Aug 25, 2024 · User authentication is a critical aspect of software development, and getting it right can be a challenge. In this post, we'll provide a comprehensive guide to user authentication flows, …

  9. Authentication flows as a condition in Conditional Access policy ...

    Jul 2, 2025 · To give you more control over your security posture, Conditional Access lets you control certain authentication flows. This control begins with explicitly targeting device code flow. Device …

  10. entra-docs/docs/identity-platform/authentication-flows-app ... - GitHub

    Learn about application scenarios for the Microsoft identity platform, including authenticating identities, acquiring tokens, and calling protected APIs. The Microsoft identity platform supports authentication …