Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

Over the top auth strategies (Friends)

2302.608 - 2321.578 Dan Moore

I can walk through kind of how pass keys work if that'd be helpful. But anyway, there is a private key that is held someplace and that is what's used to kind of authenticate you. And they're also locked down to the domain, right? They're associated to a domain, which is really, really great too, because it removes all kinds of phishing problems, right?

0
💬 0

Comments

There are no comments yet.

Log in to comment.