Authentication

Authentication Articles

Authentication Articles
Avoiding Authentication System Lock-In

Avoiding Authentication System Lock-In

Steps you can take to avoid auth system lock-in include: considering portability, limiting usage, insulating your application with a facade, and having a backup plan.

Combining SSO and MFA in FusionAuth

Combining SSO and MFA in FusionAuth

In this article, you'll learn how to combine single sign-on with multi-factor authentication in FusionAuth.

Common Authentication Implementation Risks And How To Mitigate Them

Common Authentication Implementation Risks And How To Mitigate Them

What are risks of implementing authentication, authorization and user management, and how can you mitigate them?

How Does SSO Work? | Single Sign-On Explained | FusionAuth

How Does SSO Work? | Single Sign-On Explained | FusionAuth

Learn how SSO (Single Sign-On) works to simplify user access. Explore the process, benefits, and security features that allow users to log in once and access multiple applications seamlessly.

How FusionAuth Simplifies Compliance with MFA Requirements

How FusionAuth Simplifies Compliance with MFA Requirements

Compliance is a broad term, but one thing is for sure, whatever makes it easier is good. Learn how MFA with FusionAuth can ease your compliance journey.

How to Implement Time Based One Time Passwords in FusionAuth

How to Implement Time Based One Time Passwords in FusionAuth

Discover how to implement time-based one-time passwords in FusionAuth. How are TOTP used? What does TOTP do?

Passwordless SSO: Secure and Seamless Authentication | FusionAuth

Passwordless SSO: Secure and Seamless Authentication | FusionAuth

Explore passwordless SSO and how it enhances security and user experience. Learn about passwordless authentication methods that provide safe, streamlined access without traditional passwords.

Securing Your User Experience with MFA

Securing Your User Experience with MFA

A good user experience (UX) should be table stakes. This article delves into the decisions and processes you'll want to consider when adding multi-factor authentication (MFA) to your application.

The Developer Benefits of Single Sign-On

The Developer Benefits of Single Sign-On

What is Single Sign-On and how can it help developers build successful applications?

The Security Implications Of Passwordless Authentication

The Security Implications Of Passwordless Authentication

Learn about passkeys and other passwordless authentication.

Types Of Kubernetes Auth

Types Of Kubernetes Auth

What are the three levels of Kubernetes authentication?

WebAuthn Explained

WebAuthn Explained

An in-depth look at how WebAuthn can help you add biometric authentication to your website.

What Is Multi-Factor Authentication (MFA)? Methods, Types, and How It Works | FusionAuth"

What Is Multi-Factor Authentication (MFA)? Methods, Types, and How It Works | FusionAuth"

Learn what multi-factor authentication (MFA) is, how it works, and the different types and methods used. Strengthen security by understanding MFA’s role in verifying user identity.

What is Passwordless Authentication and How it Works | FusionAuth

What is Passwordless Authentication and How it Works | FusionAuth

Learn what passwordless authentication is, how it works, and its benefits for enhancing security and user experience with methods like magic links and biometrics.

What Is WebAuthn and How Does It Work? | FusionAuth

What Is WebAuthn and How Does It Work? | FusionAuth

Learn what WebAuthn is and how it works to enable secure, passwordless authentication. Explore its benefits, supported devices, and how it improves login security.

Why Login Failures Matter

Why Login Failures Matter

Are you tracking your login failures? Learn about how to track them, why it matters, and what you should do to avoid login failure.

Why Passwordless Authentication Matters in the Age of WebAuthn

Why Passwordless Authentication Matters in the Age of WebAuthn

Uncover the essentials of WebAuthn for secure, passwordless online authentication and its protection against phishing.