Auth Patterns

The following sections outline how users, applications and systems are authenticated.

Web Applications Served from CORE

External Web Applications (in development)

External Systems (not implemented)


[EARLY DRAFT RELEASE] Copyright 2020-2025 Telicent Limited. All rights reserved