<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.authsignal.com</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/home</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/contact</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/comparison/twilio-vs-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/comparison/auth0-vs-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/legal/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/legal/security</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/legal/cookies</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/figma-passkeys-template</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/figma-desktop-passkeys-template</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/palm-biometrics-verification-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/figma-template-best-practices-for-webapp-sign-in-with-a-passkey-ui-kit</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/biometric-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/whatsapp-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/no-code-rules-engine</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/single-view-of-the-customer</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/why-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/pre-built-ui</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/comparison/aws-cognito-vs-authsignal-plus-aws-cognito</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/search</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/email-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/teams/engineers</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/risk-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/careers</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/digital-credential-verification</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/session-management</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/qr-code-verification</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/in-app-verification</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/features/push-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/guides</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/account-takeovers</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/call-center</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/compliance</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/crypto</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/e-commerce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/education-elearning</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/fake-accounts</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/financial-services</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/fintech</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/fraud-protection</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/go-passwordless</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/healthcare</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/insurance</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/login-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/marketplace</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/onboarding-sign-up</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/qr-payments</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/session-hijacking-risks</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/use-cases/user-management</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/4-places-in-your-customer-journey-you-should-consider-placing-passwordless-authentication-challenges-today</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/5-authentication-trends-that-will-define-2026-our-founders-perspective</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/action-rules-mastering-authsignals-rules-engine</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/action-rules-the-complete-implementation-guide</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/adaptive-mfa-for-auth0</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/add-mfa-to-keycloak-using-authsignal-a-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/amazon-cognito-introduces-passwordless-authentication-but-its-built-in-flows-come-with-limitations</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/analysis-mygov-passkeys-implementation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/apples-wwdc25-passkey-updates-fast-forwarding-the-journey-to-passwordless</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/are-face-id-and-passkeys-the-same-exploring-key-differences</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/auth0-alternatives-dont-migrate-just-plug-in-and-authenticate</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authentication-provider-nz-government-mfa-and-passwordless-solutions</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-and-iproov</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-deduce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-joins-iata-strategic-partnership-program-to-advance-digital-identity-adoption-in-travel-and-aviation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-launches-canada-data-region-for-enterprise-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-partners-with-dt-asia-to-bring-passwordless-authentication-across-asia-pacific</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-partners-with-servicenow-to-launch-native-passkey-authentication-to-contact-center-workflows</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-partnership-with-mattr-binding-mobile-drivers-license-mdl-to-palm-biometrics</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-recognized-as-a-kuppingercole-rising-star-in-ciam-and-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-sekura-mobile</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/authsignal-yubikey-integration-win-a-yubikey</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/auththsignals-passwordless-authentication-and-fraud-rules-engine-is-live-in-europe-and-australia-regions</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/automating-chainalysis-workflows-how-to-integrate-chainalysis-kyt-with-authsignai-to-mitigate-crypto-crime-and-streamline-operations</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/aws-cognito-implement-passwordless-login-and-mfa-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/bank-negara-malaysias-rmit-update-just-raised-the-bar-on-authentication-heres-how-to-comply</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/best-fraud-mitigation-software-tools-a-guide-to-fraud-prevention-software-vendors</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/beyond-standard-authentication-when-to-augment-aws-cognito-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/biometrics-passkey-binding</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/bsp-circular-1213-philippine-banks-must-replace-sms-otps-by-june-2026</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/building-adaptive-authentication-with-amazon-cognito-and-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/call-center-authentication-best-practices</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/cisa-endorses-fido-passkeys-protecting-against-telecommunication-network-interception</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/considerations-for-deploying-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/context-aware-mfa-how-to-protect-critical-actions-without-killing-ux</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/demystifying-passkeys-how-passkeys-work-and-why-authsignal-is-the-optimal-choice-to-deploy-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/digital-credentials-explained-how-they-complement-passkeys-in-modern-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/embedding-passkeys-into-your-app-workflows-why-authsignals-approach-stands-out</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/enable-self-serve-user-authenticator-management-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/essential-eight-updates-the-rise-of-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/first-credit-union-authsignal-a-passkey-deployment-case-study</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/flutter-passkeys-sdk</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/fsc-standard-no-29-australian-superannuation-funds-mfa</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-a-global-real-estate-company-strengthened-mfa-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-authsignals-passkey-uplift-flow-solves-the-password-problem</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-modern-authentication-is-fixing-call-center-security-and-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-actually-stop-credential-stuffing-in-2025</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-adaptive-mfa-and-passkeys-to-any-web-app-with-authsignal-and-lambda-edge</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-mfa-to-duende-identityserver-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-passkey-step-up-auth-in-your-app</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-passkeys-to-duende-identityserver-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-passkeys-to-keycloak-with-authsignal-a-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-add-push-authentication-in-your-react-native-app-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-champion-passkeys-within-your-organization</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-deploy-passkeys-that-drive-real-adoption-insights-from-yubico-and-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-enable-mfa-for-auth0-using-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-implement-adaptive-mfa-with-passkeys-for-smarter-risk-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-implement-conditional-ui-for-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-implement-passkeys-for-e-commerce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-meet-compliance-requirements-for-multi-factor-authentication-mfa-controls</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-meet-psd2-sca-dynamic-linking-requirements-using-passkeys-with-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-migrate-from-azure-ad-b2c-to-microsoft-entra-external-id</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-migrate-from-passage-to-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-pair-aws-cognito-with-authsignal-to-implement-passkeys-in-a-native-mobile-app</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/how-to-pair-aws-cognito-with-authsignal-to-implement-passkeys-in-a-web-app</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/implementing-passkeys-in-react-native-why-expo-go-falls-short-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/increased-digitization-increased-fraud-risk</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/india-and-the-uae-are-phasing-out-sms-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/integrate-authsignal-with-azure-ad-b2c</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/java-passkeys-back-end-sdk</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/june-2025-sms-otp-regulatory-updates-bankings-global-shift-to-secure-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/june-update-ai-authentication-logic-fast-backtesting-advanced-banking-demo</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/looking-for-a-passage-alternative-why-teams-are-migrating-to-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/mastercard-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/modern-authentication-a-strategic-edge-for-forward-thinking-financial-services-institutions</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/navigating-passkeys-within-sca-psd2</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/nist-supplementary-guidelines-for-passkeys---april-2024---part-2---implementation-considerations</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/nist-supplementary-guidelines-for-passkeys-april-2024-part-1</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/nists-september-2024-update-to-password-guidelines-improved-user-experience</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/nrf-2025-retail-biometrics-review-palm-biometrics-by-authsignal-in-partnership-with-qualcomm</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passkey-recovery-fallback</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passkeys-apis-and-sdks---making-passkeys-implementation-easier-and-secure</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passkeys-mobile-native-sdks</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passkeys-support-for-aws-cognito-amplify</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passwordless-and-adaptive-mfa-for-microsoft-azure-ad-b2c</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passwordless-authentication-in-2025-the-year-passkeys-went-mainstream</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/passwordless-react-ui-components-add-passkeys-to-your-client-side-app</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/protecting-loyalty-programs-with-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/push-authentication-the-best-authentication-experience-for-mobile</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/relying-parties-for-passkeys-guide</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/revoluts-passkey-implementation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/secure-authentication-chain-avoid-passkey-pitfalls</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/secure-your-servicenow-workflows-with-authsignal-call-connect</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/sim-swap-fraud-is-our-generations-y2k-moment</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/step-up-authentication-with-duende-identityserver-and-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/supercharge-passwordless-authentication-with-aws-cognito-and-authsignals-web-sdk-and-react</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/synced-vs-device-bound-passkeys-convenience-and-authentication-experiences</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/the-best-passwordless-authentication-tools-a-guide-to-passwordless-authentication-flows</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/the-real-cost-of-building-authentication-in-house</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/the-top-types-of-fraud</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/the-uks-ncsc-made-the-strongest-official-case-for-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/top-3-account-take-over-ato-attack-vectors-to-watch</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/twilio-verify-vs-authsignal-the-twilio-alternative-that-does-more-with-less-dev-effort</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/unlock-passwordless-for-aws-cognito</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/ux-best-practices-for-passkeys-understanding-device-initiated-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/webinar-july-2025-building-high-trust-in-the-age-of-ai-powered-fraud</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/weve-been-credential-stuffed-the-rapid-response-playbook-for-account-take-overs-and-credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-happens-when-your-passkey-device-is-lost-understanding-recovery-and-device-sync</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-is-a-no-code-fraud-rules-engine</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-is-a-passkey-and-how-do-passkeys-work</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-is-adaptive-multi-factor-authentication-the-best-mfa-and-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-is-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-is-visa-vamp-thresholds-fees-and-how-it-affects-your-dispute-ratio</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/what-issuing-and-verifying-millions-of-passkeys-has-taught-us-at-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/whatsapp-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/why-sms-based-authentication-is-no-longer-enough-for-secure-account-protection</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/world-leading-airline-uplifts-security-with-passkeys-implementation-and-authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/world-passkey-day-how-to-deliver-passkeys-at-scale-in-2026</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/world-passkey-day-the-state-of-passkeys-in-2025</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/worlds-first-palm-crypto-payment-at-nrf-2026</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/articles/zero-trust-in-consumer-b2c-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/account-recovery</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/account-take-over</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/ai-agents</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/air-new-zealand</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/airlines</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/announcements</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/api</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/auth0</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/auth0-integration</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/authentication-chain</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/authsignal</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/autofill</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/aws</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/aws-cognito</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/azure-ad-b2c</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/biometric-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/biometrics-passkey-binding</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/bsp-circular-1213</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/build-vs-buy</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/call-center-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/call-connect</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/chainalysis</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/cisa</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/cognito</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/comparison</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/compliance</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/compliance-regulation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/crypto</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/csharp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/custom-ui</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/customer-journey</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/deduce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/deep-fake</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/device-bound-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/digital-ids</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/duende-identityserver</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/e-commerce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/email-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/entra-external-id</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/events</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/existing-apps</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fallback</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fido2</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/financial-services</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/flexible-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fraud-awareness</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fraud-risk-management</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/fsc</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/guides</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/implementation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/in-app-verification</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/integration</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/java</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/keycloak</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/loyalty-programs</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/managing-authenticators</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/migration</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/nextauth-js</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/nist</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/no-code-rules-engine</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/node-js</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/nrf-big-show</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/open-id-connect-oidc</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/palm-biometrics</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/partnerships</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passage-migration</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passkey-recovery</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passkeys-implementation</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passkeys-implementation-analysis</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/philippine-banking</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/phishing-resistant</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/php</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/pre-built-ui</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/press-release</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/psd2</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/psd2-sca</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/push-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/push-verification</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/python</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/qr-code</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/react</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/react-native</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/relying-party-id</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/risk-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/ruby</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/ruby-on-rails</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/salesforce</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/sdk</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/security</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/sekura</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/servicenow</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/single-view-of-the-customer</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/sms-alternative</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/sms-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/sms-otp-2</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/soc2</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/supabase</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/synced-passkeys</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/the-essential-eight</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/tools-for-humanity</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/twilio-verify</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/ui-components</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/ux-guidelines</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/webauthn</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/whatsapp-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/yubikey</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/blog/tag/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/aaron-zhong</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/ashutosh-bhadauriya</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/ben-rolfe</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/chris-fisher</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/dario-salice</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/hamish-meikle</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/justin-soong</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/matthew-dominick</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/morgan-french-stagg</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/paul-bickley</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/steven-clouston</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/author/vanessa-leite</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/asp-dot-net</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/auth0</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/aws-cognito</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/azure-ad-b2c</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/csharp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/custom-identity-provider</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/duende-identityserver</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/nextauth-js</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/node-js</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/open-id-connect-oidc</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/php</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/python</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/react</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/ruby</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/passkeys-mfa/ruby-on-rails</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is/ip-spoofing</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is/mfa</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is/passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is/risk-based-authentication-explained</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/what-is/sms-otp</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/address-is-sanctioned</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/asset-amount-usd</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/asset-code</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/atypical-travel</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/browser</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/browser-engine</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/card-brand</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/card-funding-type</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/card-issuer-country-code</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/card-issuer-name</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/device-count</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/device-is-a-bot</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/device-is-new</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/dynamically-reference-other-tracked-actions-via-window-aggregations</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/email-address</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/enrolled-authenticators</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/has-previously-verified</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/impossible-travel</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ip-address</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ip-country-code-in-ofac-list</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ip-country-codes</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ip-is-anonymous</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ip-is-unrecognized</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ipv4-cidr-range</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/ipv4-is-in-whitelist</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/last-authenticated-at</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/last-verification-method</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/operating-system</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/phone-number</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/the-number-of-enrolled-authenticators</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/transaction-metadata</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/user-id-risk-score-chainalysis</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/user-metadata</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/userid</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/authentication-rules-and-policies/wallet-address</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/careers/business-development-representative-hunter</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/careers/devsecops-engineer</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/careers/forward-deployed-engineer</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/azure-ad-b2c</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/bird</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/chainalysis</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/duende-identityserver</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/iproov</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/messagemedia</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/modica-group</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/nextauth-js</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/servicenow</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/tnz</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/twillio</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/veriff</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/partners/yubico</loc>
    </url>
    <url>
        <loc>https://www.authsignal.com/guides/7-multi-factor-authentication-solutions-pros-cons-guide</loc>
    </url>
</urlset>