Verifiable Information: An EU initiative to increase trust and reduce cost
Verifiable Information: An EU initiative to increase trust and reduce cost

Verifiable Information: An EU initiative to increase trust and reduce cost

20 November 2025 8 min read
Why Caller Authentication is a Better Way to Verify Identity on the Phone
Why Caller Authentication is a Better Way to Verify Identity on the Phone

Why Caller Authentication is a Better Way to Verify Identity on the Phone

20 October 2025 2 min read
Digital Identity in Europe Depends on More Than Wallets
Digital Identity in Europe Depends on More Than Wallets

Digital Identity in Europe Depends on More Than Wallets

7 October 2025 2 min read
Practical Guide to FTN Compliance & the Idura Compliance Checker
Practical Guide to FTN Compliance & the Idura Compliance Checker

Practical Guide to FTN Compliance & the Idura Compliance Checker

21 August 2025 3 min read
5 Reasons Verifiable Credentials Are Not Yet Widely Adopted
5 Reasons Verifiable Credentials Are Not Yet Widely Adopted

5 Reasons Verifiable Credentials Are Not Yet Widely Adopted

9 July 2025 3 min read
10 Use Cases for Verifiable Credentials
Verifiable Credentials: Use Cases & Real-World Examples

10 Use Cases for Verifiable Credentials

9 July 2025 4 min read
6 Business Benefits of Verifiable Credentials
Verifiable Credentials: What Are Their Business Benefits?

6 Business Benefits of Verifiable Credentials

9 July 2025 5 min read
Why Signed Authorization Requests Elevate Your Security
Why Signed Authorization Requests Elevate Your Security

Why Signed Authorization Requests Elevate Your Security

25 June 2025 4 min read
Private Key JWT: A Stronger Alternative for Client Authentication
Private Key JWT: A Stronger Alternative for Client Authentication

Private Key JWT: A Stronger Alternative for Client Authentication

18 June 2025 3 min read
Securing Authentication Flows with JSON Web Encryption
Securing Authentication Flows with JSON Web Encryption

Securing Authentication Flows with JSON Web Encryption

18 June 2025 3 min read
JSON Web Encryption: How It Works, Why Important, and When to Use It
JSON Web Encryption: How It Works, Why Important, and When to Use It

JSON Web Encryption: How It Works, Why Important, and When to Use It

18 June 2025 7 min read
Want to Switch to a New eID Provider?
Looking To Switch Your eID Provider? Consider Idura.

Want to Switch to a New eID Provider?

28 January 2025 2 min read
Multi-Factor Authentication: Definition, Use Cases, and Benefits
Multi-Factor Authentication: Definition, Use Cases, and Benefits

Multi-Factor Authentication: Definition, Use Cases, and Benefits

16 December 2024 5 min read
Passkeys: an Overview
Passkeys: an Overview

Passkeys: an Overview

13 December 2024 7 min read
eIDAS Levels of Assurance in Different National eID Schemes
eIDAS Levels of Assurance in Different National eID Schemes

eIDAS Levels of Assurance in Different National eID Schemes

6 December 2024 4 min read
What is Authentication?
What is Authentication? Factors, Types, and Examples

What is Authentication?

5 December 2024 6 min read
What is biometric authentication?
Biometric Authentication: Everything You Need to Know

What is biometric authentication?

2 December 2024 5 min read
Zero-Knowledge Proofs: A Beginner's Guide
Zero-Knowledge Proofs: A Beginner's Guide

Zero-Knowledge Proofs: A Beginner's Guide

12 September 2024 10 min read
Getting Started with iDIN: The Complete Guide for Businesses
How to Get Started With iDIN: The Complete Guide

Getting Started with iDIN: The Complete Guide for Businesses

1 August 2024 3 min read
How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID Phone Authentication
How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID Phone Authentication

How to Authenticate Callers with Twilio, CIBA, and the Swedish BankID Phone Authentication

4 July 2024 10 min read
An Introduction to Client Initiated Backchannel Authentication (CIBA)
An Introduction to Client Initiated Backchannel Authentication (CIBA)

An Introduction to Client Initiated Backchannel Authentication (CIBA)

31 May 2024 4 min read
What Are SD-JWT-based Verifiable Credentials?
What Are SD-JWT-based Verifiable Credentials?

What Are SD-JWT-based Verifiable Credentials?

21 March 2024 7 min read
Verifiable Credentials: A Glossary (For Everyone)
Verifiable Credentials Explained In Simple Terms

Verifiable Credentials: A Glossary (For Everyone)

1 March 2024 7 min read
Understanding JWT Validation: A Practical Guide with Code Examples
Understanding JWT Validation: A Practical Guide with Code Examples

Understanding JWT Validation: A Practical Guide with Code Examples

22 January 2024 11 min read
How To Use Fiddler to Debug Authentication Flows
How To Use Fiddler to Debug Authentication Flows

How To Use Fiddler to Debug Authentication Flows

12 December 2023 9 min read
Use Cases for Address Registry Lookups: From UX to Fraud Detection
Use Cases for Address Registry Lookups: From UX to Fraud Detection

Use Cases for Address Registry Lookups: From UX to Fraud Detection

25 October 2023 4 min read
Introducing Custom HTML & CSS for Login Flows
Introducing Custom HTML & CSS for Login Flows

Introducing Custom HTML & CSS for Login Flows

2 October 2023 3 min read
Persistent User Identification with eIDs
Persistent User Identification with eIDs

Persistent User Identification with eIDs

7 June 2023 4 min read
User Authentication: Comparing Session-based and Token-based Implementations
User Authentication: Comparing Session-based and Token-based Implementations

User Authentication: Comparing Session-based and Token-based Implementations

26 May 2023 11 min read
Strong Customer Authentication 101
Girl with phone

Strong Customer Authentication 101

1 May 2023 2 min read

Sign up for our newsletter

Stay up to date on industry news and insights