Authentication

JWTs or similar token-based authentication

https://dzone.com/articles/enabling-two-factor-authentication-for-your-web-ap

https://auth0.com/
https://auth0.com/docs/identityproviders
https://www.onelogin.com/saml
https://www.pingidentity.com/en.html

https://www.plesk.com/rock-solid-server-security
http://www.sitepoint.com/authentication-and-sharing-in-android-with-the-google-api/
https://developers.google.com/identity/sign-in/web/

http://www.sitepoint.com/passwordless-authentication-works
http://www.sitepoint.com/authenticating-google/
http://www.sitepoint.com/wp-api-and-oauth-using-wordpress-without-wordpress/

https://stormpath.com/
https://github.com/stormpath
https://github.com/stormpath/stormpath-express
https://github.com/stormpath/stormpath-sdk-node
https://github.com/stormpath/stormpath-restify

http://www.sitepoint.com/magical-authentication-sorcery

http://phpmaster.com/integrating-open-authentication-using-opauth/
http://phpmaster.com/pci-compliance-and-the-php-developer/

http://www.sitepoint.com/social-network-authentication-merging-accounts/
http://www.sitepoint.com/social-network-authentication-google/
http://www.sitepoint.com/social-network-authentication-setup/

http://www.sitepoint.com/using-guzzle-twitter-via-oauth/
http://www.sitepoint.com/social-network-authentication-twitter-facebook/
http://www.sitepoint.com/social-network-authentication-merging-accounts/

http://www.sitepoint.com/php-authorization-jwt-json-web-tokens/

Authentication schemes such as One Time Passwords (OTP) implemented using a 
hardware token can also be key in fighting attacks such as CSRF and client-side 
malware. A number of hardware tokens suitable for MFA are available in the 
market that allow good integration with web applications.
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License