Expert Advice for Developers

Learn everything you need to know about authentication, authorization, identity, and access management from our team of industry experts. Jump start your development and get back to building something awesome.

Expert Advice for Developers

CIAM Articles

CIAM is complex and can increase your risks if incomplete or wrong. Use this expert advice on CIAM to implement secure and efficient identity management.

Challenges of CIAM

Challenges of CIAM

Authentication and customer identity and access management are a complex mix of use cases and security issues that touch every aspect of your business. Here are a selection of authentication and CIAM challenges we solve so developers can focus on building the application features that earn you revenue.

Developers Guide to GDPR

Developers Guide to GDPR

The General Data Protection Regulation (GDPR) was adopted by the European Parliament in 2016 and is designed to address consumers' concerns about the collection and use of their personal data. This article will help prepare your application for GDPR compliance.

Auth and the Bottleneck Architecture

Auth and the Bottleneck Architecture

A common pattern for modern organizations is to centralize user management with a bottleneck architecture. One or multiple user management systems are provisioned and all authentication and authorization requests are routed through them.

The Auth Facade Pattern

The Auth Facade Pattern

What is an Auth Facade or Identity Broker? Why is it useful when deploying to heterogenous customer environments? What are characteristics you should look for when evaluating an Auth Facade solution?

Making Sure Your Auth System Can Scale

Making Sure Your Auth System Can Scale

With password hashing, you get better security at the cost of a performance hit. More robust security often means changes to how scalable your solution is. To be a responsible and effective software engineer, you need to know how to deal with these scalability concerns while keeping your application’s authentication secure. In this article, you’ll get some tips on how to scale your authentication functionality and make sure it can meet the demands of your customers.

FusionAuth is Auth Built for <devs>

FusionAuth gives devs complete flexibility with minimal implementation effort. Use our Fast Path install to get started in minutes.

GET STARTED FOR FREE
Callout