Should we build end-point authentication into apps, or is this something better handled by a dedicated protocol that runs out-of-band with respect to the apps?

 

E-mail feedback is welcome, and I’m hoping this point is covered by one of the presentations at the meeting.

 

Alper