
Discover Authentication Best Practices
Course 1 of 7 in Authentication Best Practices
Protect your authentication flow with security strategies that prevent account takeovers and block threat actors from using stolen passwords.
Register for the learning path to register for this course
Building a secure authentication flow is critical for protecting your users and applications from credential stuffing. This course covers the essential authentication best practices for configuring a secure authentication environment, including implementing foundational defenses and deploying passwordless solutions.
- Describe the different types of credential stuffing attacks
- Explain Breached Password Protection and Brute-Force protection
- Configure password complexity requirements to prevent known weak passwords
- Implement an MFA-enforced password for login and reset flow
- Identify the different methods of passwordless authentication
- Describe the user and security benefits of passkeys