
Why outsource your auth system?
You're a software engineering leader, and you're great at your job. You know that the optimal path for software development lies in figuring out which...
January 20, 2021
Categories

You're a software engineering leader, and you're great at your job. You know that the optimal path for software development lies in figuring out which...
January 20, 2021

The Grant Negotiation and Authorization Protocol, also known as GNAP, is currently being formulated in an IETF working group. This protocol will not be...
January 7, 2021

Breached password detection may be the wave of the future, but some third-party solutions are better than others. Performance, flexibility, ease of use, user...
October 19, 2020

Suppose you have an application to which access is so sensitive that if any user's password is found to be breached, the account should immediately be locked;...
August 13, 2020

One common pattern for modern organizations is to centralize user management with a bottleneck architecture. A solid user management system is provisioned and...
July 8, 2020
Hey look! OAuth is getting spiffed up a bit. The original OAuth 2.0 specification was released in October 2012 as RFC 6749. It replaced OAuth 1.0, released in...
April 15, 2020

If you follow us on Twitter (if you don't, you can fix that now) you'll see that we post about data security breaches hitting the internet community. We don't...
April 9, 2019
Get updates on techniques, technical guides, and the latest product innovations coming from FusionAuth.
Just dev stuff. No junk.