Blog Posts

Get the latest updates on FusionAuth, security, general coding and major geekery here.

  • FusionAuth Identity & Access Management Solution Is Recognized with Industry Distinctions from Leading SaaS Review Platform

    by

    CompareCamp, a B2B and B2C technology review site, recently awarded FusionAuth the 2019 Great User Experience and Rising Star Awards. This is a huge accomplishment. We created FusionAuth to provide a free, powerful customer identity access management (CIAM) platform for every app in every size organization.

    Read More
  • Join us for Boulder Startup Week

    by

    Do you have the incredible skills to start your own business and be successful? The heros at Boulder Startup Week (BSW) can show you how you can do it without becoming a green rage monster in the process. This year BSW—the original startup week event—is celebrating ten years of bringing together the marvels of the technology, business and entrepreneur communities. FusionAuth is proud to be one of the many presenters, volunteers and sponsors that bring this event to life.

    Read More
  • FusionAuth 1.6 Adds SAML Support and More

    by

    If you haven’t seen it on Github yet, we are always taking feedback and suggestions on what our clients need from FusionAuth. This week we are releasing Version 1.6 and are stoked to deliver it to you. We’ve added a few new features and made some minor fixes for issues discovered by our community of users on Stackoverflow and Github. Get the brief overview below, and visit our release notes for the full details.

    Read More
  • Building the FusionAuth Homebrew Formula

    by

    Do you want to install FusionAuth but want to use Homebrew instead of Docker or using a boring zip file? No problem. Our goal is to be the fastest and easiest authentication platform to deploy, wherever and whenever you want. We have a Homebrew formula that will get you up and running in minutes. In this post I’ll show you how it works and provide details on how we pulled it together.

    Read More
  • Password Security Compliance Checklist

    by

    Right or wrong, usernames and passwords have been a critical component of website and application security for years. However, weak passwords can result in a costly data breach if compromised. To help ensure stronger password security, leading organizations have published clear criteria to discourage users from selecting easy to guess passwords. We have assembled those criteria into one checklist of key password recommendations to help you evaluate and improve your own password policies.

    Read More