CIAM Articles

CIAM is complex and can increase your risks if incomplete or wrong. Use this expert advice on CIAM to implement secure and efficient identity management.

Challenges of CIAM

Challenges of CIAM

Authentication and customer identity and access management are a complex mix of use cases and security issues that touch every aspect of your business. Here are a selection of authentication and CIAM challenges we solve so developers can focus on building the application features that earn you revenue.

Developers Guide to GDPR

Developers Guide to GDPR

The General Data Protection Regulation (GDPR) was adopted by the European Parliament in 2016 and is designed to address consumers' concerns about the collection and use of their personal data. This article will help prepare your application for GDPR compliance.

Auth and the Bottleneck Architecture

Auth and the Bottleneck Architecture

A common pattern for modern organizations is to centralize user management with a bottleneck architecture. One or multiple user management systems are provisioned and all authentication and authorization requests are routed through them.

The Auth Facade Pattern

The Auth Facade Pattern

What is an Auth Facade or Identity Broker? Why is this pattern useful when deploying to heterogenous customer environments? What are characteristics you should look for when evaluating an Auth Facade solution? This article will discuss and answer each of these questions.

Making Sure Your Auth System Can Scale

Making Sure Your Auth System Can Scale

With password hashing, you get better security at the cost of a performance hit. More robust security often means changes to how scalable your solution is. To be a responsible and effective software engineer, you need to know how to deal with these scalability concerns while keeping your application’s authentication secure. In this article, you’ll get some tips on how to scale your authentication functionality and make sure it can meet the demands of your customers.

The Demise of Third-Party Cookies and Why You Need to Run Your Own CIAM System

The Demise of Third-Party Cookies and Why You Need to Run Your Own CIAM System

With the right CIAM system, companies can gather relevant data about their customers, grow their businesses, and still keep user privacy intact by enabling users to easily manage their own account profiles and security settings.

FusionAuth is Auth Built For Devs

FusionAuth gives devs complete flexibility with minimal implementation effort. Use our fast path install to get started in minutes.