Knowledge Base

Identity glossary

Authentication is full of abbreviations. We explain the most important terms in a clear and practical way.

Oauth 2.0 & OpenID Connect

Oauth 2.0

The current industry standard for authorization. Think of it like a hotel key: it gives access to certain rooms (scopes), but does not necessarily prove who you are. Version 2.1 consolidates best practices and removes insecure legacy flows (like implicit flow).

OIDC (OpenID Connect)

A layer on top of OAuth 2.0 focused on identity. While OAuth says "you may enter", OIDC says "you are this user". It provides the id_token containing user data. Tuurio acts as a standards-compliant OIDC provider.

Security

PKCE (Proof Key for Code Exchange)

Pronounced: "Pixie"

A security mechanism that prevents intercepted auth codes from being abused. The app creates a secret, hashes it and sends only the hash first. During token exchange the original secret must be provided. Mandatory for mobile apps and SPAs.

MFA / 2FA

Multi-factor authentication: something you know (password) plus something you have (phone or security key). Tuurio supports TOTP authenticator apps and WebAuthn.

Tokens

JWT (JSON Web Token)

A compact format to transmit claims securely. A JWT has header, payload and signature. Tuurio signs tokens cryptographically so your backend can verify authenticity without querying a database.

Refresh token

A long-lived key your app can use to obtain new access tokens without forcing the user to log in again. It must be stored securely and can be revoked by admin or user if compromised.

Passkeys (WebAuthn)

Passkeys

The end of passwords. Passkeys use device biometrics (FaceID, TouchID, Windows Hello) with public-key cryptography. No shared secret is transmitted. Tuurio supports passkeys out of the box.

Any questions?

Check our developer docs for technical implementation details.

Go to developer guide