Hide upstream identity providers with the Auth Facade
During conversations with FusionAuth customers, I have seen a common deployment pattern I call the "Auth Facade". This architecture is useful when deploying...
January 27, 2021
Categories
During conversations with FusionAuth customers, I have seen a common deployment pattern I call the "Auth Facade". This architecture is useful when deploying...
January 27, 2021
You're a software engineering leader, and you're great at your job. You know that the optimal path for software development lies in figuring out which...
January 20, 2021
The Grant Negotiation and Authorization Protocol, also known as GNAP, is currently being formulated in an IETF working group. This protocol will not be...
January 7, 2021
Breached password detection may be the wave of the future, but some third-party solutions are better than others. Performance, flexibility, ease of use, user...
October 19, 2020
Suppose you have an application to which access is so sensitive that if any user's password is found to be breached, the account should immediately be locked;...
August 13, 2020
One common pattern for modern organizations is to centralize user management with a bottleneck architecture. A solid user management system is provisioned and...
July 8, 2020
Hey look! OAuth is getting spiffed up a bit. The original OAuth 2.0 specification was released in October 2012 as RFC 6749. It replaced OAuth 1.0, released in...
April 15, 2020
Get updates on techniques, technical guides, and the latest product innovations coming from FusionAuth.
Just dev stuff. No junk.