Attila Bertók

67%
Flag icon
In first-party authentication, the authority (us) keeps a database of credentials. The principal (the caller who claims to have an identity) provides credentials that the authority checks against its database. If the credentials match, the authority accepts that identity for the principal.
Release It!: Design and Deploy Production-Ready Software
Rate this book
Clear rating