Blog.
- #auth0 alternative
- #Authentication
- #custom login
- #API
- #keycloak vs. zitadel
- #auth0 vs. zitadel
- #PHP SDK
- #Ruby SDK
- #Build vs. Buy
- #typescript-login
- #GRPC
- #Python SDK
- #terraform
- #Authorization
- #zitadel
- #announcement
- #Beyond Authentication
- #actions
- #token-management
- #SDK
- #oidc
- #Zitadel SDKs
- #iam
- #multi-tenancy
- #iaac
- #zitadel_cloud
- #community
- #about_us
- #Service Ping
- #Java SDK
- #engineering
- #keycloak alternative
- #how-to
- #features
- #imo
- #open_source
- #pentest
- #security
- #self_hosting
- #case_studies
- #alternative

Single Sign-On (SSO) vs. Federated Identity Management (FIM) - The Key Differences
Numerous businesses have implemented solutions like federated identity management (FIM) and single sign-on (SSO) to enhance authentication process security while minimizing password fatigue. This article discusses the difference between these two approaches.
• 6 min
Comparing ZITADEL to Firebase
The purpose of this article is to guide readers on what are the differences between ZITADEL and Firebase
• 11 min
Built with ZITADEL: A Partnership in Fintech Security with Kaspar&
By leveraging ZITADEL, Kaspar& has successfully enhanced the user experience and security for B2C customers interacting with their mobile app.
• 10 min
Why an Authentication Solution Is Crucial for GDPR Compliance
This article discusses the role of identity (IAM) vendors in becoming GDPR compliant and the responsibilities of data processors and controllers.
• 6 min
ZITADEL's New and Improved User Onboarding Process
This post explains what's new in ZITADEL's user onboarding process.
• 4 min
Configuring Custom Claims in ZITADEL
This article demonstrates how to add custom claims to your tokens through customizable actions.
• 7 min
API Access and Token Introspection with OpenId Connect in ZITADEL
This follow-up article demonstrates how to use ZITADEL to secure APIs and how back-end applications can access these protected APIs.
• 13 min
OIDC Version 2.0 Release
We have released version 2.0 of our OpenID Connect library, which includes many changes.
• 3 min
Social Engineering - How Hackers are Manipulating You
This article discusses the six most commonly encountered social engineering tactics and how to protect your account from cybercriminals.
• 9 min
Secure Logins and Resource Access with ZITADEL and OpenID Connect - Part 2
This follow-up article shows how a Web Application and a Single Page Application can securely authenticate end-users and gain access to protected resources using ZITADEL and OIDC.
• 13 min
Secure Logins and Resource Access with ZITADEL and OpenID Connect - Part 1
This article explains how applications can securely authenticate end users and control application access to protected resources using ZITADEL and OpenID Connect.
• 12 min
How Attackers Bypass Two-factor Authentication (2FA)
This article discusses five typical methods attackers use to bypass two-step verification or two-factor authentication and some precautions you may take to protect your account.
• 8 min