FusionAuth Blog

Get the latest updates on FusionAuth, identity and access management, security, general coding and major geekery here.

  • ZanoCloud helps companies make the most of the cloud with FusionAuth

    Dmitry Zanozin is a FusionAuth community member and Founder and CEO at ZanoCloud. He chatted with us over email about how he and his team are using FusionAuth to meet their auth needs.

  • Why secure gamer's user accounts?

    As the industry continues to grow, gaming is becoming a way for users to make money in addition to being a form of entertainment.

    Gamers need to be able to track and save their progress to qualify for prize money, esports league salaries, or sponsorships, as well as add to their streaming content or videos on demand. Their unique user accounts are vital to their success.

  • How to migrate your user data from Google Firebase

    Firebase is a serverless offering from Google which includes customer identity and access management (CIAM) as well as other typical functionality needed for an application. As such, it offers authentication and authorization, a database, metrics and more.

    At FusionAuth, we talk to potential customers who are interested in migrating away from Firebase because of limitations, typically of standards or data control.

  • We'll see you at Gluecon

    Gluecon is a developer focused conference in the Denver metro area. I’ve been to this conference many times; I always learn something, meet interesting new people, and have great conversations. It’s happening this week in Broomfield Colorado.

    This year, FusionAuth is sponsoring it.

  • Customer Identity and Access Management (CIAM) vs Identity and Access Management (IAM)

    Both Customer Identity and Access Management (CIAM) and IAM (Identity and Access Management) are about people who are users of your system: who can access what, how do they prove who they are, and how you manage access over time. Though there are similarities between CIAM and IAM, at their heart they serve different needs.

    Let’s take a look at these two identity management archetypes and see how they differ.