Machine to Machine Auth
Product shaping for Machine to Machine Auth, including research across various providers and authentication strategies.
Machine-to-machine Auth enables two distinct non-user principals (autonomous systems or agents) to grant access rights to each other instantly, without the need for user identities.
Created by Laura Beatris