Note. At this stage, you must have an Apple device capable of generating a certificate from Apple's Secure Enclave to use this service.
Able to log in with an Apple device and certificate that is generated by Apple's Secure Enclave.
Create a per-app rule in the database to control access to your data.
Secure user login credentials with ECC secp256r1.