Blog Posts

Get the latest updates on FusionAuth, security, general coding and major geekery here.

  • 6 Ways The FusionAuth API Is GDPR Ready

    by

    The GDPR is a complex regulation, but at its most basic level it requires organizations to provide “data protection by design and default.” FusionAuth is built with a powerful REST API that gives developers the tools they need to adhere to the requirements of the GDPR quickly and easily. On May 23, 2018 FusionAuth’s CEO Brian Pontarelli presented to Colorado’s technology leaders about how the GDPR and data privacy will affect US companies, and went into detail about how the FusionAuth API is well-suited to help companies stay GDPR compliant and avoid risks of fines and data restrictions for data protection violations.

    Read More
  • Getting Started with Email Templates in FusionAuth

    by

    The email templates in FusionAuth can be customized allowing you to present a consistent brand across all customer touch points. In this post, we show you how to set up the email templates to be ready to use FusionAuth’s integrated email features.

    Read More
  • Got Users? How About 100 Million of Them?

    by

    FusionAuth User Registration Hits 100,000,000 in Load Test

    Did you know that each time you log into Facebook, check your email or fire up Fortnite, a software engineer has thought about user registration and authentication. Hopefully she has thought a lot about it. For example, what happens if Call of Duty goes offline for maintenance and then six million users try to log back in at the same time? It could take days for users to get back online if peak loads aren’t planned for.

    Read More
  • FusionAuth Reviews from Around the World

    by

    It’s been only a few months since we launched FusionAuth and the reviews are coming in from all over. So far, developers are loving it! What’s not to love? We designed FusionAuth to deploy in seconds, integrate with any codebase, and run anywhere on any platform.

    Read More
  • Save a CPU - Ditch BCrypt, use SHA2 instead

    by

    Here’s the reality, billions of credentials have been leaked or stolen and are now easily downloaded online by anyone. Many of these databases of identities include passwords in plain text, while others are one-way hashed. One-way hashing is better (we’ll get to why in a second), but it is only as secure as is mathematically feasible. Let’s take a look at one-way hashing algorithms and how computers handle them.

    Read More