Understanding JWT Validation: A Practical Guide with Code Examples

JSON Web Tokens (JWTs) offer a secure and standardized method for storing and exchanging data in JSON format. Despite their broad adoption in modern...

How To Use Fiddler to Debug Authentication Flows

Fiddler by Telerik is a powerful tool used to monitor and analyze HTTP network traffic.

Use Cases for Address Registry Lookups: From Enhanced User Experience...

Companies often need their customer’s address for identity verification, accurate product deliveries, or providing personalized services. But users...

eIDAS Levels of Assurance in Different National eID Schemes

Trust is at the core of every form of electronic identification (eID), from logging in to digitally signing documents to conducting e-commerce...

Persistent User Identification with eIDs

Persistent User Identification with eIDs

Digital platforms and services rely on persistent user identification to consistently recognize their users across multiple interactions. Persistent...

User Authentication: Comparing Session-based and Token-based...

User Authentication: Comparing Session-based and Token-based Implementations These days, it’s almost impossible to find a web application that...

Biometric authentication

What is biometric authentication? Biometric authentication is a security measure that requires people to verify their identity by providing a unique...

Strong Customer Authentication 101

Electronic transactions and payments have become an increasingly common part of our daily lives. But at the same time, online users face the...

Mapping eID claims to Auth0: Using Actions and Rules

Through our partnership with Auth0, Criipto offers a range of eID services to help Auth0 customers streamline identity verification and improve user...

What is Authentication?

Authentication is the process of proving that an individual is who they say they are. In the digital world, this often involves granting users access...

JWT Claims in OpenID Connect: Real-world Example

OpenID Connect (OIDC) is a widely adopted standard for user authentication in modern web and mobile applications. One of its key features is the use...

3 customer benefits of using biometrics in digital authentication

The use of biometrics online helps us understand who people are and what their true identity is. Biometrics is an efficient and secure way to...

How to integrate eID authentication in your business

Over the years, an increasing number of countries have adopted eID as a way for citizens to verify themselves online. Your customers’ eID is perhaps...

3 reasons why eID is safer than a regular login

Implementing electronic identities (eIDs) in your site or app as a method of login is important in order to create a secure authentication experience...

Sign up for our blog

Stay up to date on industry news and insights