FusionAuth Blog

Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.

  • Partnering in The Passwordless Decade

    Today HYPR announced the launch of Velocity, our Partner Program aimed at building a strong passwordless ecosystem.

  • Breached password detection best practices

    Breached password detection may be the wave of the future, but some third-party solutions are better than others. Performance, flexibility, ease of use, user experience, and value can vary greatly. Keep these best practices in mind when choosing the solution that is right for your organization.

  • How to migrate your legacy user data to a centralized auth system

    Once you have migrated an application to use a modern identity provider, how can you migrate your users?

  • Securing your legacy PHP business application with OAuth

    Sometimes applications get written by interns. Sometimes prototypes get put into production. Sometimes crufty old apps, called “legacy” by some, are termed “money makers” by others. Once you introduce an auth system such as FusionAuth, you typically want to have all applications use it, even those not written with OIDC/OAuth in mind.

  • Authenticating with AWS Managed Microsoft Active Directory and LDAP

    Microsoft’s Active Directory is a common enterprise user data store. If you are building apps for users authenticated by Active Directory, you might want to connect FusionAuth to it. Another common use case is to have some applications for internal users which should be authenticated against Active Directory and other applications for people outside your organization, with user data stored in FusionAuth. FusionAuth can act as a CIAM for your external users, but delegate authentication of internal accounts to Active Directory.