Blog.
- #auth0 alternative
- #Authentication
- #custom login
- #API
- #keycloak vs. zitadel
- #auth0 vs. zitadel
- #PHP SDK
- #Ruby SDK
- #Build vs. Buy
- #typescript-login
- #GRPC
- #Python SDK
- #terraform
- #Authorization
- #zitadel
- #announcement
- #Beyond Authentication
- #actions
- #token-management
- #SDK
- #oidc
- #Zitadel SDKs
- #iam
- #multi-tenancy
- #iaac
- #zitadel_cloud
- #community
- #about_us
- #Service Ping
- #Java SDK
- #engineering
- #keycloak alternative
- #how-to
- #features
- #imo
- #open_source
- #pentest
- #security
- #self_hosting
- #case_studies
- #alternative

Social Engineering - How Hackers are Manipulating You
This article discusses the six most commonly encountered social engineering tactics and how to protect your account from cybercriminals.
• 9 min
Secure Logins and Resource Access with ZITADEL and OpenID Connect - Part 2
This follow-up article shows how a Web Application and a Single Page Application can securely authenticate end-users and gain access to protected resources using ZITADEL and OIDC.
• 13 min
Secure Logins and Resource Access with ZITADEL and OpenID Connect - Part 1
This article explains how applications can securely authenticate end users and control application access to protected resources using ZITADEL and OpenID Connect.
• 12 min
How Attackers Bypass Two-factor Authentication (2FA)
This article discusses five typical methods attackers use to bypass two-step verification or two-factor authentication and some precautions you may take to protect your account.
• 8 min
Built with ZITADEL: Improved User Experience and Security for Chapati Systems
Chapati Systems uses self-hosted instances of ZITADEL for centralized user and access management for both internal users and external customers.
• 7 min
8 Exciting New Features Coming to ZITADEL in 2023
This article showcases the most significant features scheduled to launch in the year 2023.
• 7 min
Increase Your SPA Security with Cloudflare Workers
In this article, you'll learn about single-page applications, some security issues associated with the approach, and how to improve the security of any SPA site using Cloudflare Workers.
• 13 min
How to Manage Authorizations with Role-Based Access Control
In this article, you'll learn how RBAC works, what security use cases it enables, and how you can implement it to effectively authorize your users.
• 9 min
Browser Fingerprinting: What Is It and Why Is It Used?
Data stored in browsers can be used to identify site visitors and to track their activity. Browser Fingerprinting can reduce fraud and suspicious website traffic.
• 8 min
The Best Of ZITADEL 2022
This brief recap showcases the most significant ways ZITADEL has improved in the year 2022. We are profoundly grateful for your trust in ZITADEL!
• 6 min
Thermal Attacks - How Heat From Fingertips Can Reveal Passwords
While you might be familiar with common hacking methods, such as phishing and malware, researchers have discovered a bizarre new alternative: Thermal Attacks.
• 7 min
How to handle silent-login in ZITADEL?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 3 min