CYAN Delta
Menu
  • Twitter
  • LinkedIn

    Newsletters Monthly

Simple Prototype Auth using AWS Serverless Cloud

https://github.com/ctalladen78/serverless-lambda-aws-go-boilerplate

View this post on Instagram

Authentication schemes are methods used to prove identity. Here they are ranked in order of vulnerability 🗝single factor : most vulnerable form of secrets, easily attacked using brute force and man in the middle techniques 🗝2-factor : if someone access your email, attackers can easily guess password 🗝multifactor : often used between systems, complex networks, banks. Even if someone gets the secret, they cannot use it without further knowledge of the source (ie encryption method)

A post shared by Cyan Delta (@cyandelta.app) on May 6, 2020 at 6:22pm PDT

  • Twitter
  • Facebook
  • Instagram
  • GitHub
  • LinkedIn
  • © Hugo framework and Forty theme