Overview of Authentication Methods

This topic provides an overview of authentication methods available in CyberArk Identity, wtih links to topics with more detail.

CyberArk Identity provides the following methods to authenticate users:

Adaptive MFAMulti-factor (aka MFA) authentication in which one or more security challenges must be successfully fulfilled.
Social LoginLogging in using an external social media network as the identity provider.
OAuth2 Authorization using flows supported by OAuth2.

See Public Keys for information on how to obtain the keys for your tenant.