FusionAuth Blog

Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.

  • Breached password detection best practices

    Breached password detection may be the wave of the future, but some third-party solutions are better than others. Performance, flexibility, ease of use, user experience, and value can vary greatly. Keep these best practices in mind when choosing the solution that is right for your organization.

    READ MORE
  • How to migrate your legacy user data to a centralized auth system

    Once you have migrated an application to use a modern identity provider, how can you migrate your users?

    READ MORE
  • Securing your legacy PHP business application with OAuth

    Sometimes applications get written by interns. Sometimes prototypes get put into production. Sometimes crufty old apps, called “legacy” by some, are termed “money makers” by others. Once you introduce an auth system such as FusionAuth, you typically want to have all applications use it, even those not written with OIDC/OAuth in mind.

    READ MORE
  • Authenticating with AWS Managed Microsoft Active Directory and LDAP

    Microsoft’s Active Directory is a common enterprise user data store. If you are building apps for users authenticated by Active Directory, you might want to connect FusionAuth to it. Another common use case is to have some applications for internal users which should be authenticated against Active Directory and other applications for people outside your organization, with user data stored in FusionAuth. FusionAuth can act as a CIAM for your external users, but delegate authentication of internal accounts to Active Directory.

    READ MORE
  • Contaim adopts FusionAuth to manage their auth lifecycle

    Scott Plunkett is a FusionAuth community member who is building Contaim, a game server management company. He chatted with us over email about how he and his team are using FusionAuth to meet their auth needs.

    READ MORE