# Development

The following documents help to understand the requirements and authentication process of PeerID:

{% content-ref url="development/how-does-peerid-work-without-storing-the-keys" %}
[how-does-peerid-work-without-storing-the-keys](https://devs.peerplays.com/tools-and-integrations/peerid/1.0.0/development/how-does-peerid-work-without-storing-the-keys)
{% endcontent-ref %}

{% content-ref url="development/authentication-with-peerid" %}
[authentication-with-peerid](https://devs.peerplays.com/tools-and-integrations/peerid/1.0.0/development/authentication-with-peerid)
{% endcontent-ref %}

{% content-ref url="development/brain-storming" %}
[brain-storming](https://devs.peerplays.com/tools-and-integrations/peerid/1.0.0/development/brain-storming)
{% endcontent-ref %}

{% content-ref url="development/software-requirements" %}
[software-requirements](https://devs.peerplays.com/tools-and-integrations/peerid/1.0.0/development/software-requirements)
{% endcontent-ref %}
