About 2,120,000 results
Open links in new tab
  1. What Is Token-Based Authentication? - Okta

    Jan 23, 2025 · Auth tokens work like a stamped ticket. The user retains access as long as the token remains valid. Once the user logs out or quits an app, the token is invalidated. Token …

  2. Access Tokens - Auth0

    Access tokens are used in token-based authentication to allow an application to access an API. The application receives an access token after a user successfully authenticates and …

  3. Microsoft identity platform and OAuth 2.0 authorization code flow

    The OAuth 2.0 authorization code grant type, or auth code flow, enables a client application to obtain authorized access to protected resources like web APIs. The auth code flow requires a …

  4. What Is Token-Based Authentication & How It Works - Descope

    Mar 17, 2024 · The premise of token-based authentication is simple: It uses something the user has (the token) to access their account and resources. And the primary objective of token …

  5. Ultimate Guide to Token-based Authentication - Ping Identity

    Dec 23, 2024 · Learn about token-based authentication, how it works, its benefits, and key protocols to enhance security with token authentication for web and APIs.

  6. What is an Authentication Token? - Twilio

    An Authentication Token (auth token) is a piece of information that verifies the identity of a user to a website, server, or anyone requesting verification of the user's identity.

  7. What is Token Authentication and How It Works

    Mar 25, 2025 · Learn what token authentication is, how it works, and why it's essential for secure access in APIs, JWT, OAuth2, and modern CIAM systems.

  8. What Is An Authentication Token? - Fortinet

    An authentication token securely transmits information about user identities between applications and websites. They enable organizations to strengthen their authentication processes for such …

  9. All About Authentication and Authorization Tokens: A …

    Feb 18, 2025 · This comprehensive guide delves into the world of authentication and authorization tokens, providing developers, architects, and security professionals with the …

  10. Authentication Tokens: How They Work and Why They’re Secure?

    May 22, 2025 · Instead of relying on a password to verify someone’s identity, a system issues an authentication token after the user logs in for the first time. This token acts as proof of identity …