About 6,790,000 results
Open links in new tab
  1. What Is Token-Based Authentication? - Okta

    Jan 23, 2025 · Auth tokens work like a stamped ticket. The user retains access as long as the token remains valid. Once the user logs out or quits an app, the token is invalidated. Token …

  2. Access Tokens - Auth0

    Learn about token-based authentication. Read how Auth0 uses self-contained JSON Web Token (JWTs) access tokens that conform to JSON structure with standard claims. Review the …

  3. What is an Authentication Token? - Twilio

    What is an Authentication Token? An Authentication Token (auth token) is a piece of information that verifies the identity of a user to a website, server, or anyone requesting verification of the …

  4. What Is Token-Based Authentication & How It Works - Descope

    Mar 17, 2024 · Token-based authentication is a passwordless security mechanism that validates a user's identity through the use of tokens. A token is a unique piece of data, often a string of …

  5. Ultimate Guide to Token-based Authentication - Ping Identity

    Dec 23, 2024 · Token-based authentication is an advanced authentication method where instead of traditional user credentials like passwords, a secure token is exchanged between systems …

  6. AuthToken Class (Microsoft.Exchange.WebServices.Auth ...

    Initializes a new instance of the AuthToken class. The AuthToken () constructor is applicable for clients that target Exchange Online and versions of Exchange starting with Exchange Server …

  7. Create Custom Tokens | Firebase Authentication

    Dec 18, 2025 · To achieve this, you must create a server endpoint that accepts sign-in credentials—such as a username and password—and, if the credentials are valid, returns a …