FusionAuth Blog

Get the latest updates on FusionAuth, security, general coding and major geekery here.

  • FusionAuth 1.6 Adds SAML Support and More

    FusionAuth 1.6 Adds SAML Support and More

    by

    If you haven’t seen it on Github yet, we are always taking feedback and suggestions on what our clients need from FusionAuth. This week we are releasing Version 1.6 and are stoked to deliver it to you. We’ve added a few new features and made some minor fixes for issues discovered by our community of users on Stackoverflow and Github. Get the brief overview below, and visit our release notes for the full details.

    Read More
  • Building the FusionAuth Homebrew Formula

    Building the FusionAuth Homebrew Formula

    by

    Do you want to install FusionAuth but want to use Homebrew instead of Docker or using a boring zip file? No problem. Our goal is to be the fastest and easiest authentication platform to deploy, wherever and whenever you want. We have a Homebrew formula that will get you up and running in minutes. In this post I’ll show you how it works and provide details on how we pulled it together.

    Read More
  • Password Security Compliance Checklist

    Password Security Compliance Checklist

    by

    Right or wrong, usernames and passwords have been a critical component of website and application security for years. However, weak passwords can result in a costly data breach if compromised. To help ensure stronger password security, leading organizations have published clear criteria to discourage users from selecting easy to guess passwords. We have assembled those criteria into one checklist of key password recommendations to help you evaluate and improve your own password policies.

    Read More
  • User Data Security is a Breach

    User Data Security is a Breach

    by

    If you follow us on Twitter (if you don’t, you can fix that now) you’ll see that we post about data security breaches hitting the internet community. We don’t do it to be malicious or gloat about their failures, but to increase awareness beyond the core community of security professionals. We deal with security every day so we know that keeping data secure is a complex challenge. Few people are well-versed in its many facets and subtleties, and it can be difficult to stay informed of the current trends and risks. We hear all the time “See? You can’t stop cyber breaches.” Fortunately, that’s a load of crap.

    Read More
  • Introduction to Login and Authentication Workflows

    Introduction to Login and Authentication Workflows

    by

    So you are building an application and you need login and authentication for your users. No problem! Just build a form so the user can submit a username and password and you are good to go, right? We all wish it was this simple. The fact is, there are many different application types and as many different types of authentication methods. Which is best?

    Read More