📄️ Step-up authorization
Note: This is a Beta] feature, to request access to use this feature, please reach out to our [support to enable it for your account.
📄️ Authress downtime protections
The obvious question that every responsible client asks is What happens when the service is down?
📄️ Creating an encryption key to store secrets
Many applications interact with one or more external resources. These resources have their own security, and store the credentials for access in a secure way is critical to the safety of the data they can access.