Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.
Auth specific scaling challenges
Modern authentication is built on hashing passwords using computationally expensive algorithms. Because of this intense CPU usage, there’s a push-pull relationship between robust security and scalable solutions. Since security is so critical, and frankly nonnegotiable, you’ll have to grapple with the challenges of scaling your authentication.READ MORE
Congratulations Auth0 on the acquisition by Okta
Congrats to Auth0, their employees and investors on their acquisition by Okta! This validates that CIAM is a crucial part of any application and that outsourcing it to a provider like Auth0 just plain makes sense. The identity community owes a lot to Auth0, and that includes FusionAuth.READ MORE
Softozor integrated FusionAuth with Hasura and Kubernetes and saved development effort
Dr. Laurent Michel is a FusionAuth community member and product owner at Softozor. He chatted with us over email about how he and his team are using FusionAuth to meet their auth needs.READ MORE
Authentication as a Service Security Due Diligence Tips
Within today’s software development ecosystem, third-party vendors are a common part of system architecture.
Specifically, Authentication-as-a-Service (AaaS) is growing fast. Their out-of-the-box capabilities enable engineering teams to focus on building features valuable to business rather than spending time and resources on reinventing the wheel of securing application access.READ MORE