{"version":"1.0","provider_name":"MobuSoft.com","provider_url":"https:\/\/mobusoft.com\/en\/","author_name":"admin","author_url":"https:\/\/mobusoft.com\/en\/author\/joaquim\/","title":"What authentication methods are there? - MobuSoft.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xc4VDR5PA9\"><a href=\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/\">What authentication methods are there?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/mobusoft.com\/en\/what-authentication-methods-are-there\/embed\/#?secret=xc4VDR5PA9\" width=\"600\" height=\"338\" title=\"&#8220;What authentication methods are there?&#8221; &#8212; MobuSoft.com\" data-secret=\"xc4VDR5PA9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/mobusoft.com\/wp-content\/uploads\/2022\/11\/Two_Factor_Authentication-1.svg","thumbnail_width":1,"thumbnail_height":1,"description":"In this post we are going to talk about the different types of authentication methods that exist and that applications and computer systems use to protect our accesses and ultimately our information. There are 3 types of systems, below I will describe them one by one. Authentication methods based on something known Authentication methods based [&hellip;]"}