# “Authorization based on Blockchain”

- [Key point & Technology of Authentication / 2FA & MFA](/authorization-based-on-blockchain/key-point-and-technology-of-authentication-2fa-and-mfa.md): BaaSid protects your data with a multi-layered security solution.
- [2. Introduction](/authorization-based-on-blockchain/2.-introduction.md)
- [2.1. Limitations of and problems with blockchain](/authorization-based-on-blockchain/2.-introduction/2.1.-limitations-of-and-problems-with-blockchain.md)
- [2.2. Borrowing the DB of BaaS based participants](/authorization-based-on-blockchain/2.-introduction/2.2.-borrowing-the-db-of-baas-based-participants.md)
- [2.3. Split & Distribute Data](/authorization-based-on-blockchain/2.-introduction/2.3.-split-and-distribute-data.md)
- [2.4. Verification that is user-centered based on the Public or Private Network](/authorization-based-on-blockchain/2.-introduction/2.4.-verification-that-is-user-centered-based-on-the-public-or-private-network.md)
- [2.5  Proof of integrity for Split & Distribute data](/authorization-based-on-blockchain/2.-introduction/2.5-proof-of-integrity-for-split-and-distribute-data.md)
