Authentication Articles

Authentication is complex and can increase your risks if incomplete or wrong. Use this expert advice on authentication and access management to implement secure and efficient registration and logins.

Login and Authentication Workflows

Login and Authentication Workflows

The methods of authentication used in applications today is extremely varied. This article covers a wide range of login methods recommended by experienced software architects and supported by FusionAuth. Use these articles and workflows to help architect and design the authentication system for your application.

Multi-Factor Authentication<br/>(MFA)

Multi-Factor Authentication
(MFA)

As more of our lives move online, multi-factor authentication (MFA) becomes increasingly important for keeping our accounts secure. As a developer or engineering leader, you should have an understanding of MFA, what types are available and when you might consider requiring additional factors for user authentication.

Common Authentication Implementation Risks and How to Mitigate Them

Common Authentication Implementation Risks and How to Mitigate Them

Your authentication system is one of the areas of your software system that you absolutely have to ensure is secure. A poorly implemented authentication system could cause a loss of customer trust and have negative implications for your company's finances, reputation, and regulatory compliance.

Avoiding Authentication System Lock-in

Avoiding Authentication System Lock-in

Years ago your team decided to use a third-party authentication system to avoid the time and cost of building one in-house. But now a better option has hit the market and you're wanting to make the switch. Except, hold on, your old system is so deeply ingrained into your organization that you're practically locked-in to your current vendor. Learn how to mitigate the risk of vendor lock-in.

Types of Kubernetes Auth

Types of Kubernetes Auth

When building your systems on Kubernetes, you have multiple levels of authentication and authorization to consider, including at the infrastructure and the application level. Learn more about each and what to look out for.

The Developer Benefits of Single Sign-On

The Developer Benefits of Single Sign-On

Single Sign-On (SSO) is useful for your users. But as a developer, what benefits do you get from integrating SSO into your application. Read this article to learn more about SSO and its benefits to you.

WebAuthn Explained

WebAuthn Explained

WebAuthn is a widely implemented standard which allows easy biometric authentication from your website. This article will discuss the nuts and bolts of WebAuthn, some implementation details, and more.

FusionAuth is Auth Built For Devs

FusionAuth gives devs complete flexibility with minimal implementation effort. Use our fast path install to get started in minutes.