Believe it or not there are still companies emailing users with plaintext passwords. Worse yet, some systems are storing plaintext passwords in the database. Storing or emailing plaintext passwords can increase security vulnerabilities by as much as 10x. Just freaking stop!
Get the latest updates on FusionAuth, security, general coding and major geekery here.
Keycloak and FusionAuth ComparisonMar 6th, 2019byRead More
Keycloak and FusionAuth are CIAM platforms designed to register, login and manage users in modern applications. They eliminate the risk, costly development and maintenance time required to build an in-house solution. Keycloak and FusionAuth share many features, but also have important differences. Use this information to compare the two and determine which matches your needs.
6 Ways The FusionAuth API Is GDPR ReadyMar 5th, 2019byRead More
The GDPR is a complex regulation, but at its most basic level it requires organizations to provide “data protection by design and default.” FusionAuth is built with a powerful REST API that gives developers the tools they need to adhere to the requirements of the GDPR quickly and easily. On May 23, 2018 FusionAuth’s CEO Brian Pontarelli presented to Colorado’s technology leaders about how the GDPR and data privacy will affect US companies, and went into detail about how the FusionAuth API is well-suited to help companies stay GDPR compliant and avoid risks of fines and data restrictions for data protection violations.
Getting Started with Email Templates in FusionAuthFeb 28th, 2019byRead More
The email templates in FusionAuth can be customized allowing you to present a consistent brand across all customer touch points. In this post, we show you how to set up the email templates to be ready to use FusionAuth’s integrated email features.
Got Users? How About 100 Million of Them?Feb 26th, 2019byRead More
FusionAuth User Registration Hits 100,000,000 in Load Test
Did you know that each time you log into Facebook, check your email or fire up Fortnite, a software engineer has thought about user registration and authentication. Hopefully she has thought a lot about it. For example, what happens if Call of Duty goes offline for maintenance and then six million users try to log back in at the same time? It could take days for users to get back online if peak loads aren’t planned for.