Abstract :
In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.
Keywords :
cloud computing; message authentication; SaaS application; cloud-based application security; cloud-based authentication service; software as a service; user authentication; Authentication; Authorization; Cloud computing; Cryptography; software as a service; SaaS; authentication; cloud; cloud-based applications; security; software as a service;