Serverless Webhooks with Auth0 Extend

If you are a developer of a SaaS product, one of the most important features you will add to your platform is extensibility. ...

Get Realtime Authentication Events with Auth0 and Pusher

Auth0 is a service that allows you to easily authenticate the users of your application using methods like social network logins and ...

Two-Factor Authentication Using Biometrics

TL;DR You can replace the use of traditional multifactor possession factors (phone codes, special-purpose hardware) in 2FA ...

Introducing Auth0 Extend: The new way to extend your SaaS

Today is an exciting day, as we add a new product to the Auth0 family: Auth0 Extend! Auth0 Extend gives you a Serverless extensibility ...

Join Auth0, Algolia, and Keen IO for Happy Hour at Signal 2017

Signal.2017 is less than two weeks away and we can’t wait to see what Twilio and the numerous vendors attending will have to ...

A Massive Ransomware Attack Targets Organizations Around the Globe

A ransomware, called WannaCry, is making rounds across the globe and infecting vulnerable systems worldwide. Amongst the affected ...

Google Blocks OAuth Requests Made Via Embedded Browsers

Last year, Google warned that starting April 20, 2017, it will no longer allow OAuth requests to Google via embedded browsers, ...

Data Breaches by the Numbers

While a total of 974 publicly disclosed data breaches may make 2016 sound like a hallmark year for data breaches, it gets worse when ...

Bluetooth Chooses Auth0 to Implement Standards Based Authentication

BELLEVUE, WA – Bluetooth Special Interest Group (SIG), a standards based organization that oversees the development and licensing ...

Developing JSF applications with Spring Boot

TL;DR Spring Boot was initially conceived with microservices applications in mind. But, as it excelled as a starting point for ...

The Ultimate Guide To Deploying Your PHP Applications

TL;DR: There is a popular mantra amongst developers that goes like this write, test and deploy. In this tutorial, I’ll show you ...

All You Need To Know About The Google Docs Phishing Attack

Two days ago, there was a large phishing scam that plagued the internet. It was a Google Doc phishing attack perpetrated via Gmail. On ...

The State of Biometric Identity in 2017

If we have any hope of a future with all-around passwordless, friction-free identification, it will probably come at the hands of ...

Get Ready for GDPR

Introduction The data protection and security landscape is all set for change next year with the new EU General Data Protection ...

Glossary of Modern JavaScript Concepts: Part 2

TL;DR: In the first part of the Glossary of Modern JS Concepts series, we learned about functional, reactive, and functional reactive ...

Database Versioning with Flyway and Java

Source code versioning is a subject that has been widely discussed and which has many solutions created to address it, like Git, ...

Interaction Based Authentication for Alexa Skills with Auth0

This blog post illustrates how to achieve secure authentication on each interaction with Alexa. At a very high-level this shows how to ...

The History Behind When Build Becomes Buy

The buy-vs-build battle is an eternal one for startups. With limited time, resources, and manpower, you’re always weighing the ...

Build Better Universal JavaScript Apps with Next.js 2.0

TL;DR: On Tuesday, October 25 2016, a small JavaScript framework, Next.js was released to the public. It’s a minimal framework ...

Nando's Chooses Auth0 to Centralize Identity Management

BELLEVUE, WA – Nando’s, a Portugese chicken restaurant with South African roots, has chosen Auth0 as their identity ...

Image Processing in Python with Pillow

Introduction A lot of applications use digital images, and with this there is usually a need to process the images used. If you are ...

Vuejs 2 Authentication Tutorial

TL;DR: Vuejs is a progressive JavaScript framework for building user interfaces on the web. It was launched shortly after ReactJS and ...

How Profile Enrichment and Progressive Profiling Can Boost Your Marketing

Good marketing hinges on communicating the usefulness of your product. That means knowing who your customers are and how they’ll ...

Ship your Auth0 logs to Azure Log Analytics

TL;DR: In this article, you will learn how to integrate Auth0 with Azure Log Analytics, ship your logs automatically, and analyze them ...

Social Login On The Rise: How Secure Is It?

The popularity of social login is on the rise. For users, it provides a seamless, frictionless way to login to the sites and apps that ...

ng-conf 2017 Summary – Day 3

TL;DR: Learn about the topics covered by speakers at ng-conf 2017 on April 7, 2017 (Day 3 of 3). ng-conf 2017 The final day of ng-conf ...

Why You Should Always Use Access Tokens to Secure an API

TL;DR: There is much confusion on the Web about the differences between the OpenID Connect and OAuth 2.0 specifications, and their ...

ng-conf 2017 Summary – Day 2 (Fair Day)

TL;DR: Learn about the “open-track” Fair Day at ng-conf 2017 on April 6, 2017 (Day 2 of 3). ng-conf 2017: Fair Day Day 2 of ...

When to Build and When to Buy

It’s a question many companies, big and small, ask themselves: should I build a new platform or software from scratch or should I ...

ng-conf 2017 Summary – Day 1

TL;DR: Learn about the topics covered by speakers at ng-conf 2017 on April 5, 2017 (Day 1 of 3). ng-conf 2017 ng-conf is the flagship ...

Add SSO for Disqus on your WordPress Site with Auth0

TL;DR Disqus is a great tool for adding interactivity through conversation and comments to your blog. Integrating it with your ...

Navigating RS256 and JWKS

TL;DR: When signing your JWTs it is better to use an asymmetric signing algorithm. Doing so will no longer require sharing a private ...

Polaris Chooses Auth0 for B2B, B2C, and B2E

BELLEVUE, WA – Polaris, a powersports company specializing in the manufacture of ATVs, side-by-sides, motorcycles, snow machines, ...

Java Platform and Java Community Process Overview

TL;DR: In this article I’m going to explain the most important pieces of the Java platform and provide a brief explanation of the ...

Is Passwordless Authentication More Secure Than Passwords?

One place where both businesses and consumers agree is login safety. For consumers, it’s important that they trust the login of ...

Is Passwordless Authorization More Secure Than Passwords?

One place where both businesses and consumers agree is login safety. For consumers, it’s important that they trust the login of ...

An Introduction to Ethereum and Smart Contracts: a Programmable Blockchain

Bitcoin took the world by suprise in the year 2009 and popularized the idea of decentralized secure monetary transactions. The concepts ...

How To Get A 360 View of Your Customer By Managing Identity

Having a 360 view of your customers might sound like just another marketing cliche designed to sell CRM software. But the idea—that you ...

JWT: Brute forcing HS256 is possible

JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. They can be ...

Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs

JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. They can be ...

How to Manage JavaScript Fatigue

TL;DR: Most JavaScript developers have heard of or experienced JavaScript fatigue. JS fatigue is the overwhelming sense that we need to ...

Why Identity Matters for Innovation Labs

TL;DR: Innovation drives technology and innovation labs are critical for propelling the technology industry forward. Find out about ...

Anomaly Detection: Safer Login with ThisData and Auth0

Guest post by Nick Malcolm, CTO at ThisData Anomaly Detection is the process of identifying events which are out of place or unusual. ...

Analyzing Identity in Movies

TL;DR: As technology becomes more advanced, movies are predictors of how our identity will be utilized. Our relationship with ...

Web Components: How To Craft Your Own Custom Components

TL;DR The introduction of Web Components have given developers super powers. With Web Components, web designers and developers are no ...

5 Reasons Your Company Needs Identity and Access Management

Identity management seems like just a small piece of the puzzle that keeps your business running smoothly. If there’s basic ...

User Provisioning and Access Request with Auth0 and Webtask

Automating Access Requests & Provisioning A deep look at how we automated our employee access request system “Give me access to ...

Critical Vulnerability in JSON Web Encryption

TL;DR If you are using go-jose, node-jose, jose2go, Nimbus JOSE+JWT or jose4 with ECDH-ES please update to the latest version. RFC 7516 ...

Using Serverless Azure Functions with Auth0 and Google APIs

Guest post by @SteveALee of OpenDirective.com TL;DR: Learn how Node.js backend code can access a Google API once a user logs in with ...

Serverless development reimagined with the new Webtask Editor

If you are building serverless applications, then you want to get from zero to code in seconds. We’ve just shipped a brand new ...
Load More