Blog.
- #auth0 alternative
- #Authentication
- #custom login
- #API
- #keycloak vs. zitadel
- #auth0 vs. zitadel
- #PHP SDK
- #Ruby SDK
- #Build vs. Buy
- #typescript-login
- #GRPC
- #Python SDK
- #terraform
- #Authorization
- #zitadel
- #announcement
- #Beyond Authentication
- #actions
- #token-management
- #SDK
- #oidc
- #Zitadel SDKs
- #iam
- #multi-tenancy
- #iaac
- #zitadel_cloud
- #community
- #about_us
- #Service Ping
- #Java SDK
- #engineering
- #keycloak alternative
- #how-to
- #features
- #imo
- #open_source
- #pentest
- #security
- #self_hosting
- #case_studies
- #alternative

How Does the Internet of Things Authentication Work?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 9 min
Use ZITADEL as SSO provider for self-hosting
In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider
• 10 min
Pentest Results H2 / 2022
A security analysis of ZITADEL was conducted with an external specialist. Learn more about the scope and results.
• 3 min
How the learning assistant Micromate profits from the multi-tenancy power of ZITADEL
Companies and public institutions of various sizes use the learning assistant to bring everyone’s knowledge to the next level with the power of ZITADEL.
• 6 min
Simplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 10 min
What is an Identity Broker? - Everything you need to know
Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.
• 4 min
How to secure your Java application with OpenID Connect
In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps
• 18 min
Your Spellchecker Might Have Leaked Your Passwords
Whereas a seemingly innocent spellchecker might not raise any red flags, convenience and confidentiality are regrettably not always compatible online. This article explains the privacy shortcomings of Chrome’s Enhanced Spellcheck and Edge’s MS Editor and what you can do to keep your data safe.
• 4 min
Why Security Questions Are Useless And Unsafe
Discussing the shortcomings of security questions as a protection measure and what you can do to make them stronger.
• 8 min
Full Stack ZITADEL Integration with Next.js
In this tutorial, you'll learn how to set up a Next.js project using JavaScript. You'll also learn how to integrate that with ZITADEL, an open source identity management platform and security layer for your web application.
• 12 min
JWT vs. Opaque Tokens
In this article, you'll learn why you need JWT and opaque tokens, what the differences are between the two, and in which case you should select one or the other.
• 8 min
Why Choose an Open Source Authentication Provider
In this article, you'll learn about open source authentication providers, their common use cases, and what your organization stands to gain from adopting an open source authentication solution.
• 9 min