Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.
How to use OAuth to Add Authentication to Your React App
Whenever you build a website that allows a user to create their own account, secure authentication and authorization is a must-have. The problem is that most handmade authentication and authorization solutions are not robust enough to keep up with the most current and secure workflows. What’s more, since security is not always seen as a business priority, in-house authorization solutions can quickly become an internal tool that is not often touched, prone to disrepair and exploitation by bad actors.READ MORE
FusionAuth Adds Enterprise Kubernetes Support, Making It Simple to Add Authentication & Authorization Support to Kube Clusters
FusionAuth, the authentication and authorization platform built for developers, today announced Enterprise Kubernetes Support. Building on Kubernetes is a solid foundation for microservices and other modern architectures, but in today’s zero trust environments, developer teams still need a way to ensure that access is limited to authorized users and services. By deploying FusionAuth into their Kubernetes clusters, teams have an API-first, developer friendly identity provider for all their credentials and token management needs.READ MORE
FusionAuth Names Don Bergal as CEO to Further Advance Sales of Company's Developer-First Identity and Access Management Platform
FusionAuth, the authentication and authorization platform built for developers, today announced Don Bergal as the company’s chief executive officer (CEO). Mr. Bergal assumes the CEO role from Brian Pontarelli, founder of FusionAuth, who will become the company’s chief technology officer (CTO). In his role as CEO, Mr. Bergal will oversee all of FusionAuth’s operations with an emphasis on sales and marketing to accelerate organic growth for the organization.READ MORE
Zero Trust and How IdPs Factor Into It
Years ago, before the widespread adoption of cloud and SaaS-based offerings, IT security was arguably simpler. For a while, you could assume with a decent level of confidence that anyone inside your corporate network was meant to be there and could be trusted. Meanwhile, anyone outside the network was not to be trusted.
This is no longer the case.READ MORE