Blog.
ZITADEL on- #features
- #zitadel_cloud
- #self_hosting
- #security
- #case_studies
- #pentest
- #community
- #engineering
- #about_us
- #alternative
- #imo
- #open_source
Simplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 8 minWhat is an Identity Broker? - Everything you need to know
Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.
• 5 minHow to secure your Java application with OpenID Connect
In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps
• 10 minYour Spellchecker Might Have Leaked Your Passwords
Whereas a seemingly innocent spellchecker might not raise any red flags, convenience and confidentiality are regrettably not always compatible online. This article explains the privacy shortcomings of Chrome’s Enhanced Spellcheck and Edge’s MS Editor and what you can do to keep your data safe.
• 4 minWhy Security Questions Are Useless And Unsafe
Discussing the shortcomings of security questions as a protection measure and what you can do to make them stronger.
• 7 minFull Stack ZITADEL Integration with Next.js
In this tutorial, you'll learn how to set up a Next.js project using JavaScript. You'll also learn how to integrate that with ZITADEL, an open source identity management platform and security layer for your web application.
• 10 minWhat is the fuzz around serverless (containers)?
Our talk at Open Source @ Siemens event on May 17, 2022. What is the fuzz around serverless (containers)? By Florian Forster
• 51minJWT vs. Opaque Tokens
In this article, you'll learn why you need JWT and opaque tokens, what the differences are between the two, and in which case you should select one or the other.
• 5 minWhy Choose an Open Source Authentication Provider
In this article, you'll learn about open source authentication providers, their common use cases, and what your organization stands to gain from adopting an open source authentication solution.
• 5 minSecurity Threats of Public Wi-Fi - Is It Just Fearmongering?
Although public Wi-Fi networks certainly carry some frightening risks with a lot on the line, it is evident that such attacks aren't guaranteed occurrence. So how likely is it really that one will fall victim to a malicious network?
• 7 minDoes your application only support SAML? Fear not, ZITADEL can help you!
With the latest version of ZITADEL we introduced support for the security a session markup language protocol which gives you a broad range of new options for Single-Sign-On with your favorite apps
• 2 minUse OIDC Authorize Request to Customize User Login
One of the critical challenges in designing software systems is identity management. User accounts need to be created, maintained, and promptly secured to ensure the safe and continuous functionality of critical business systems. However, doing so is easier said than done.
• 2 min