Social Login via Multi-Party Computation
For application processes not demanding elevated security measures, the system will support social login functionalities to streamline user onboarding for low-security applications.
The safeguarding of unique authentication secrets for this login mechanism is achieved through multi-party computation. In this framework, the user retains one key, while the social login service holds another, which is utilised to facilitate social login. Both keys are essential for the login process, ensuring the user maintains full control over their authorisation credentials [Ref #2].
Last updated