Authentication (last accessed January 8, 2022): https://www.techtarget.com/searchsecurity/definition/authentication
Identification and Authentication Failures (last accessed January 9, 2022): https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/
What Is Certificate-Based Authentication and Why Should I Use It? (last accessed on January 8, 2022): https://www.globalsign.com/en/blog/what-is-certificate-based-authentication
5 Authentication Methods that Can Prevent the Next Breach (last accessed January 9, 2022): https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/
The Ultimate Authentication Playbook (last accessed January 9, 2022): https://www.okta.com/blog/2019/02/the-ultimate-authentication-playbook/
Web Authentication Methods Compared (last accessed January 9, 2022): https://testdriven.io/blog/web-authentication-methods/
Authentication for web applications (last accessed January 9, 2022): http://web.science.mq.edu.au/~mattr/courses/web_applications/9_Authentication/notes.html
Different ways to Authenticate a Web Application (last accessed January 9, 2022): https://medium.com/@vivekmadurai/different-ways-to-authenticate-a-web-application-e8f3875c254a
Information Security - Authentication and Access Control (last accessed on December 28, 2021): https://www.edx.org/course/information-security-authentication-and-access-control