The process through which iov42 technology uses Public Key cryptography to verify that any requests are from a valid identity within a zone.

Sign up for our newsletter

Subscribe now and get exclusive news, interviews and stories.

Subscribe
By submitting your email you consent to receive iov42 newsletters by email. You can unsubscribe at any time. For further information, please see our Terms and Conditions and Privacy Policy