←Home

Guidance: How to use authenticators to protect an online service (1. 0)

Office for Artificial Intelligence UK Published: 2026-03-03 09:00:02

This guidance, also known as Good Practice Guide (GPG) 44, will help you choose an authenticator that will give you the level of protection that’s most suitable for users accessing your service.

No full content stored. Use “Open Source” to read the original.

Recommended reads
At Mobile World Congress 2026, the Global Coalition on Telecoms (GCOT) launched security and resilience principles for 6G.
Security and Resilience Principles for 6G from the governments of the Global Coalition on Telecoms (GCOT).
A specification to help DVS and relying parties organise and exchange information in a consistent way to enable interoperability