Follow There's implementation and there's theory. For implementation, what are the takehome lessons? I see a few:

1. Don't use external identifiers as user IDs

2. Allow for migration of identifiers (email, etc.)

3. Request secondary or tertiary authentication schemes when possible.

Do you agree? Is there more?

· · Web · 1 · 0 · 0
Sign in to participate in the conversation

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!