Blog Posts

Get the latest updates on FusionAuth, security, general coding and major geekery here.

  • A Quick Comparison Of Ping Identity And FusionAuth

    by

    Ping Identity and FusionAuth are two customer identity and access management solutions that have received a lot of attention recently. They share many features, but since they are designed to solve different challenges, they have important differences. Use this information to compare the two solutions and determine which has the features that match your company’s needs.

    Read More
  • Firebase and FusionAuth CIAM Comparison

    by

    As we talk to and win new clients, we learn about the other identity management platforms that are available today. One of the more interesting discoveries is that Firebase and FusionAuth are coming up as comparable products. While they are both called identity management solutions, the truth is that Firebase and FusionAuth are very different products designed with a substantially different set of features. As true CIAM solutions, they really don’t compare.

    Read More
  • Multi-tenancy in a Single-tenant Architecture

    by

    While FusionAuth is fundamentally a single-tenant solution, we do support multiple tenants within a single-tenant instance. In this post I’ll outline a few of the common use cases we solve with our tenancy feature.

    Read More
  • Download counts from Google Cloud Storage

    by

    Watching real-time Google Analytics is fun but it wasn’t telling us how many people are downloading FusionAuth. Since we are using download count to measure if people are finding FusionAuth and the website is making it easy for them to download and play around with it, I wanted to display our download count on the dashboard we have in the office.

    Read More
  • Amazon Cognito and FusionAuth Comparison

    by

    Identity management is a hot topic lately—stories about cyber breaches, industrial-scale data mining and the EU’s GDPR all connect back to a company’s identity system eventually. Too often those stories gloss over that fact that many of these data protection failures were avoidable if companies implemented more effective customer identity and access management (CIAM) solutions. Two popular solutions, Amazon Cognito and FusionAuth approach the problem from different perspectives.

    Read More