Authentication methods

This section describes the authentication methods available in CyberArk Identity.

CyberArk Identity provides the following methods to authenticate users:



Adaptive multi-factor authentication

Multi-factor authentication (MFA), in which one or more security challenges must be successfully fulfilled.

Social login

Logging in using an external social media network as the identity provider.

OAuth 2.0

Authorization using flows supported by OAuth2.

See Public keys overview for information on how to obtain the keys for your tenant.

In this section: