With token authentication, you have access to a proven security method that uses the token as proof of identification. This allows you to control access to specific resources. The token is a unique string of characters generated by an authentication server. It authorizes you, the user, to view and use specific digital applications.
Select your token type here