How to Protect Your Organization From Auth Vendor Lock-in
Years ago your team decided to use a third-party auth system to avoid the time and cost of building one in-house. But now a better option has hit the market...
July 12, 2021
Categories
Years ago your team decided to use a third-party auth system to avoid the time and cost of building one in-house. But now a better option has hit the market...
July 12, 2021
Software applications regularly need to gain access to data from other services on behalf of their users. An application may need to grab a list of user's...
June 10, 2021
Given the increase of data beaches in the past few years, it's more important than ever for software engineering leaders to prioritize security, quality...
May 20, 2021
The Implicit grant is part of the OAuth 2 RFC, but is one of the features omitted in the OAuth 2.1 specification. With this grant, you don't have to write...
April 29, 2021
Open-source authentication providers are popular because anyone can review much or all of the code that powers them. This availability can be especially...
April 15, 2021
As more of our lives and data move online, multi-factor authentication (MFA) becomes increasingly important to help keep our accounts secure. As a user, you...
April 8, 2021
Modern authentication is built on hashing passwords using computationally expensive algorithms. Because of this intense CPU usage, there's a push-pull...
March 11, 2021
A newsletter for developers covering techniques, technical guides, and the latest product innovations coming from FusionAuth.
Just dev stuff. No junk.