🐫Broken Authentication

Good thing to know:

The most widespread authentication method in web applications is login forms, where users enter their username and password to prove their identity.

Here are the most common auth methods:

  • Knowledge-based authentication

    • something that the user knows to prove their identity (password...).

  • Ownership-based authentication

    • user proves their identity by proving the ownership of a physical object or device (ID card, auth apps...)

  • Inherence-based authentication

    • something the user is or does (fingerprints, facial patterns...)

Last updated