Blog.
ZITADEL on- #auth0 alternative
- #auth0 vs. zitadel
- #zitadel_cloud
- #community
- #about_us
- #engineering
- #features
- #imo
- #open_source
- #pentest
- #security
- #self_hosting
- #case_studies
- #alternative
Built with ZITADEL: 23 Technologies' Kubernetes-as-a-Service
Dive into 23 Technologies' journey of creating a unified user experience in their cloud services with ZITADEL.
• 9 minMigrate Users from Keycloak to ZITADEL
With PBKDF2 support now available, transitioning your users from Keycloak to ZITADEL has become smoother than ever. Dive into this tutorial to master the migration process.
• 16 minEvolving IoT Security: From Traditional Logins to Device Authorization Flow
Delve into the transformative power of the OAuth 2.0 Device Authorization Flow, enabling seamless logins across smart devices. Learn how standards-compliant Identity Providers are anchoring this wave of secure, user-friendly authentication.
• 6 minWhy FIDO2 Passkeys are Safer than MFA and Passwords
This article explores the reasons why FIDO2 passkeys surpass passwords and MFA in terms of security.
• 7 minNavigating Session Logouts, Timeouts, and Token Expiry
Using ZITADEL's OIDC integrations as a guide, this article offers insights into mastering the essential security measures of session timeouts, logouts, and token expriy.
• 17 minBuilt with ZITADEL: Orbica's Cloud Native Geospatial Platform
Exploring how Orbica leveraged ZITADEL for exclusive authentication in its geospatial platform.
• 10 minFrom Persona-based to Resource-based: Rethinking ZITADELs API Design
We decided to adopt a resource-based API for ZITADEL in response to feedback from our customers and community members.
• 5 minZITADEL in the Classroom: A Look at smartive's and OST's Advanced Frontend Engineering Course
Smartive and OST have enhanced the user experience in their Advanced Frontend Engineering Course by utilizing ZITADEL.
• 9 minHow MFA Fatigue Attacks Compromise User Security
This article discusses MFA Fatigue Attacks targeting MFA systems with push notifications and how we can mitigate them.
• 7 minZITADEL and Fine-Grained Authorization: A Code-Focused Exploration
This articles showcases fine-grained authorization with ZITADEL and delves into managing access control, validating tokens, and separating business logic from authorization rules.
• 14 min5 Authentication Methods at ZITADEL - Ranked from Least to Most Secure
This article showcases ZITADEL's five implementable authentication methods ranked from worst to best regarding security and user experience (UX).
• 8 minReuniting Across Boundaries: Our Unforgettable First Team Retreat
This article recounts the journey of our first team retreat as a remote-first company.
• 8 min