Zero-Knowledge Proofs: A Beginner's Guide

Zero-Knowledge Proofs (ZKPs) are powerful cryptographic tools with a wide range of practical applications. In this article, we’ll provide a simple...

How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID...

In this tutorial, we’ll create a minimal implementation of Twilio’s Voice API along with Swedish BankID in telephone calls to demonstrate simple and...

An Introduction to Client Initiated Backchannel Authentication (CIBA)

Traditional OpenID Connect authentication flows in web and mobile applications rely on browser redirects. Users typically start the authentication...

Passkeys: an Overview

Passkeys are a new kind of login credentials that entirely replace passwords.

What Are SD-JWT-based Verifiable Credentials?

Verifiable Credentials are changing the digital identity space and will soon become part of our daily lives.

Verifiable Credentials Explained In Simple Terms

Verifiable Credentials: A Glossary (For Everyone)

As you learn more about identity management and the wallet ecosystem, you’ll come across concepts related to verifiable credentials. This terminology...

Understanding JWT Validation: A Practical Guide with Code Examples

JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...

How To Use Fiddler to Debug Authentication Flows

Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.

Cryptography 101: What Is Hashing?

Hashing plays a crucial role in managing and protecting digital information. But what is it exactly, and how does it work? In this blog post, we’ll...

Trusted Timestamping: Comprehensive Guide & Use Cases

The practice of timestamping information has a long history. Centuries ago, scientists and inventors like Galileo and Robert Hooke used anagrams and...

Use Cases for Address Registry Lookups: From Enhanced User Experience...

Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...

eIDAS Levels of Assurance in Different National eID Schemes

Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...

Introducing Custom HTML & CSS for Login Flows

Introducing Custom HTML & CSS for Login Flows

User journeys often start with the login page. Yet when it comes to design and user experience, this critical element can get overlooked.

How to Integrate itsme® with Auth0 via Criipto Verify

In a recent blog post about the Belgian itsme®, we explored its versatile use cases, seamless onboarding process, and user-centric design.

Belgian itsme®: What Are the Benefits & How to Get Started

itsme® is a digital identity solution developed collaboratively by major banks and telecom providers in Belgium. It’s a secure and user-friendly way...

What Are Universal Links and App Links, and How to Implement Them

In this blog post, we’ll talk about how to implement Universal Links and App Links.

A Guide to Integrating Swedish BankID Into a React Native (+Expo)...

Do you need to integrate Swedish BankID into your React Native & Expo project? Criipto’s newly released SDK is here to simplify the process. The...

How to Build a B2B Login Flow With MitID Erhverv (+ React Code...

MitID Erhverv is a new authentication solution tailored specifically for business use cases. It simplifies user administration, role management, and...

Building Signature Workflows with MitID Erhverv

The new MitID Erhverv (“MitID for business”) gives employees a secure and convenient way to handle various digital tasks on behalf of their...

3 Types of MitID Business (erhverv) Logins

3 Types of MitID Business Logins (+Examples)

What are the three types of MitID Business logins?

Persistent User Identification with eIDs

Persistent User Identification with eIDs

Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...

User Authentication: Comparing Session-based and Token-based...

User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...

A Guide to Integrating Norwegian BankID with Okta

As more businesses move their operations online, it’s essential to ensure that only authorized personnel can access sensitive data and systems....

Mapping eID claims to Auth0: Using Actions and Rules

Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...

How To Integrate Norwegian BankID with Auth0: A Detailed Guide

If you want to add Norwegian BankID to your application and are already using Auth0 as your authentication solution, this guide is for you.

JWT Claims in OpenID Connect: Real-world Example

OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...

Sign up for our blog

Stay up to date on industry news and insights