Authentication

Validation that a user is who they say they are and exists in a system. Usually validated through credentials.

Tooling

SPIFFE


References:

  • Tarandach, I., & Coles, M. J. (2020). Threat Modeling: A Practical Guide for Development Teams (1st ed.). O’Reilly Media.

Notes mentioning this note


Here are all the notes in this garden, along with their links, visualized as a graph.