
Why is there no authentication in OAuth?
OAuth, a standard for securely delegating authorization information, and OIDC, a profile written on top of it to securely transmit user profile data, both rely...
June 14, 2022
Categories
OAuth, a standard for securely delegating authorization information, and OIDC, a profile written on top of it to securely transmit user profile data, both rely...
June 14, 2022
As the industry continues to grow, gaming is becoming a way for users to make money in addition to being a form of entertainment. Gamers need to be able to...
June 1, 2022
Both Customer Identity and Access Management (CIAM) and IAM (Identity and Access Management) are about people who are users of your system: who can access...
May 10, 2022
Years ago, before the widespread adoption of cloud and SaaS-based offerings, IT security was arguably simpler. For a while, you could assume with a decent...
October 5, 2021
In April of 2021, Auth0, an identity provider powering authentication for hundreds of websites, experienced an hours-long outage. During the outage, users...
August 5, 2021
Years ago your team decided to use a third-party auth system to avoid the time and cost of building one in-house. But now a better option has hit the market...
July 12, 2021
Software applications regularly need to gain access to data from other services on behalf of their users. An application may need to grab a list of user's...
June 10, 2021
Get updates on techniques, technical guides, and the latest product innovations coming from FusionAuth.
Just dev stuff. No junk.