Skip to main content
Categories

02. What security measures and protocols are used by IPification?

You are here:
< All Topics

IPification is based on well-known identity standards – OpenID, which also includes OAuth2, which provides full reliability to all the stakeholders in the ecosystem.

Table of Contents