Blog.
- #auth0 alternative
- #keycloak vs. zitadel
- #auth0 vs. zitadel
- #Build vs. Buy
- #zitadel_cloud
- #community
- #about_us
- #engineering
- #keycloak alternative
- #features
- #imo
- #open_source
- #pentest
- #security
- #self_hosting
- #case_studies
- #alternative
The Best Of ZITADEL 2022
This brief recap showcases the most significant ways ZITADEL has improved in the year 2022. We are profoundly grateful for your trust in ZITADEL!
• 6 minThermal Attacks - How Heat From Fingertips Can Reveal Passwords
While you might be familiar with common hacking methods, such as phishing and malware, researchers have discovered a bizarre new alternative: Thermal Attacks.
• 7 minHow to handle silent-login in ZITADEL?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 3 minHow Does the Internet of Things Authentication Work?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 9 minUse ZITADEL as SSO provider for self-hosting
In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider
• 10 minPentest Results H2 / 2022
A security analysis of ZITADEL was conducted with an external specialist. Learn more about the scope and results.
• 3 minHow the learning assistant Micromate profits from the multi-tenancy power of ZITADEL
Companies and public institutions of various sizes use the learning assistant to bring everyone’s knowledge to the next level with the power of ZITADEL.
• 6 minSimplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 10 minWhat is an Identity Broker? - Everything you need to know
Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.
• 4 minHow to secure your Java application with OpenID Connect
In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps
• 18 minYour Spellchecker Might Have Leaked Your Passwords
Whereas a seemingly innocent spellchecker might not raise any red flags, convenience and confidentiality are regrettably not always compatible online. This article explains the privacy shortcomings of Chrome’s Enhanced Spellcheck and Edge’s MS Editor and what you can do to keep your data safe.
• 4 minWhy Security Questions Are Useless And Unsafe
Discussing the shortcomings of security questions as a protection measure and what you can do to make them stronger.
• 8 min