About this webinar
When it comes to integrating mobile apps into the single sign-on environment, conflicts of interest often arise between designers, IT security, and what the customer really wants.
What influence does the chosen login procedure have on security, and which approaches have proven themselves in practice? What compromise could satisfy the customer and still offer a sufficient level of security? Discover current best practices and find out what role OAuth 2.0 plays in them.
1. Conflict of interest – designer, end customer, and IT security
2. Influence of login method on user satisfaction
3. Security assessment
4. Best practices, procedures, and recommendations
5. OAuth 2.0 as a possible solution
Andre Priebe, CTO, iC Consult Group