top of page

Stronger Identity,
Happier Customers.
Ready to modernize your identity infrastructure?
Let's secure your growth together.
Search for Midships Knowledge Base
! No Results found


Infrastructure-as-Code (IaC)
What it is: Infrastructure-as-Code (IaC) is the practice of managing and provisioning IT infrastructure through machine-readable...

Ajit Gupta
Aug 12, 20201 min read


Zero Downtime IAM
What it is: Zero-Downtime IAM is the practice of designing and operating Identity and Access Management (IAM) systems to maintain...

Ajit Gupta
Aug 12, 20201 min read


IAM Journeys
What it is: IAM Journeys refer to the orchestrated authentication and authorization flows that guide users through identity-related...

Ajit Gupta
Aug 12, 20201 min read


ABAC
What it is: ABAC , or Attribute-Based Access Control , is a dynamic access management model that grants or denies permissions based on...

Ajit Gupta
Aug 12, 20201 min read


RBAC
What it is: RBAC , or Role-Based Access Control , is an access management model that grants permissions based on a user’s role within an...

Ajit Gupta
Aug 12, 20201 min read


FIDO2
FIDO2 is a password-less authentication standard developed by the FIDO Alliance and the World Wide Web Consortium (W3C). It combines the...

Ajit Gupta
Aug 12, 20201 min read


eKYC (Electronic Know Your Customer)
What it is: eKYC stands for Electronic Know Your Customer , a digital process used to verify the identity of customers remotely using...

Ajit Gupta
Aug 12, 20201 min read


MFA (Multi-Factor Authentication)
What it is: MFA , or Multi-Factor Authentication , is a security mechanism that requires users to verify their identity using two or more...

Ajit Gupta
Aug 12, 20201 min read


Behavioral Biometrics
What it is: Behavioral Biometrics is an advanced Adaptive Security technique that identifies users based on unique patterns in their...

Ajit Gupta
Aug 12, 20201 min read
bottom of page



















