In the previous article (Guide to Digital Identity-Part 1), we talked about the basics of digital identity and authentication methods. (If you haven’t already read it, read it now!). The purpose of this article is to help you understand when to use which authentication method. We will talk about the details, pros and cons, and use cases of the various authentication methods. Let’s start with the fundamental authentication methods introduced in part 1.