FusionAuth Blog

Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.

  • Supercharge Development with FusionAuth

    Businesses have begun to acknowledge that the physical health of developers is an asset. As a result, many workstations now come equipped with furniture and devices designed to encourage natural posture, reduce exertion, and function within optimal reach zones. Such tools boost productivity by helping eliminate employee absences caused by repetitive strain injuries.

    But employers often overlook the mental strain developers can experience from repetitive and complex coding tasks. Fortunately, the team at FusionAuth is working to reduce such pain points in the massively complex customer identity access management (CIAM) space.

    Read more over at hostingadvice.com

    READ MORE
  • Announcing FusionAuth 1.26

    We’re excited to announce the release of version 1.26 of FusionAuth. This shipped on April 20, 2021. This version resolves issues for FusionAuth community members and customers on versions 1.25 and older. This was a big release!

    READ MORE
  • What's Wrong With the OAuth2 Implicit Grant?

    The Implicit grant is part of the OAuth 2 RFC, but is one of the features omitted in the OAuth 2.1 specification. With this grant, you don’t have to write server side code. Instead of having to exchange an authorization code for an access token, you are provided an access token on redirect.

    READ MORE
  • AdCellerant seamlessly migrated their data from MongoDB to FusionAuth

    James Humphrey, Senior Director of Technology at AdCellerant, and Jeff Fairley, Senior Director of Engineering at AdCellerant, sat down and talked to us about how this growing adtech company is using FusionAuth.

    READ MORE
  • What to consider before choosing an open source auth provider

    Open-source authentication providers are popular because anyone can review much or all of the code that powers them. This availability can be especially helpful in evaluating whether a particular authentication provider will work for your use case. In addition, if you want the source code for any number of reasons (e.g., the provider could go out of business or get acquired), open source is basically tailor-made for that.

    READ MORE