Token-Mediating Backend: An alternative to the BFF architecture
This post discusses the Token-Mediating Backend (TMB) authentication architecture for OAuth 2 applications. It covers how secure TMB is, when to use it, and...
May 7, 2026
Tags
This post discusses the Token-Mediating Backend (TMB) authentication architecture for OAuth 2 applications. It covers how secure TMB is, when to use it, and...
May 7, 2026
On September 8, 2025, developer Josh Junon received what looked like a legitimate npm two-factor authentication (2FA) reset email. Within hours, malicious code...
April 22, 2026
Utilizing OAuth2 with a browser popup for authentication can be challenging when implementing automated testing in an Android Emulator.
August 20, 2025
In today's content-driven world, a regular requirement is to share content across multiple platforms to maximize reach and engagement. However, managing...
August 18, 2025
As AI becomes part of how companies build, test, and scale their software, it's raising a new question: is your authentication strategy ready?
July 16, 2025
This article discusses the dangers of storing OAuth tokens in the browser or on a client-side device – a common pattern in serverless architectures like...
June 30, 2025
OAuth scopes allow your users to grant permission to data held by you to third-party applications. As APIs become more common, and especially with the growth...
May 19, 2025
Showing 1 to 7 of 37 results
Get updates on techniques, technical guides, and the latest product innovations coming from FusionAuth.
Just dev stuff. No junk.