All posts/ #engineering
Why Choose an Open Source Authentication Provider
In this article, you'll learn about open source authentication providers, their common use cases, and what your organization stands to gain from adopting an open source authentication solution.• 5 min
Does your application only support SAML? Fear not, ZITADEL can help you!
With the latest version of ZITADEL we introduced support for the security a session markup language protocol which gives you a broad range of new options for Single-Sign-On with your favorite apps• 2 min
Use OIDC Authorize Request to Customize User Login
One of the critical challenges in designing software systems is identity management. User accounts need to be created, maintained, and promptly secured to ensure the safe and continuous functionality of critical business systems. However, doing so is easier said than done.• 2 min
You wanted PostgreSQL? We got you covered.
We extend the database compatibility of ZITADEL with support for PostgreSQL databases in addition to CockroachDB.• 2 min
Everything you need to know about Multitenancy
This article discusses multitenancy's definition and its benefits over a single-tenant SaaS architecture.• 5 min
Introducing ZITADEL Version 2.0!
As a result of many months of diligent effort from our community and developers, we are thrilled to finally announce the first significant upgrade to our Identity & Access Management (IAM) platform - ZITADEL Version 2.0.• 3 min
Magic Links – Are they Actually Outdated?
Are magic links are still viable as an authentication method or are you better off using newer passwordless alternatives?• 6 min
The Ultimate Guide to Choosing the Right Data Residency
This article explains the role of data residency and centers in greater detail and list the factors you might want to consider when choosing a center region.• 6 min
Social Logins: The Unexpected Drivers of Business Growth
Besides their obvious advantage of increased login convenience, social logins were also proven superior in enhancing business growth. To explain this correlation, it is essential to know how social logins work and how they benefit end-users and companies alike.• 5 min
The Truth About Building Your Own Authentication Server
Despite a large supply of purchasable solutions, some firms choose to build their own authentication server. While this solution might work for some, there are various potentially unknown drawbacks that you should consider before settling for this method.• 4 min
A serverless future
With the rise of serverless and our need to scale, we wanted to explore the possibilities and values that modern serverless platform provides.• 3 min
SAML vs OIDC: Which Protocol is Best for Your Organization?
To help you determine which protocol is best suited for your use case, this article carefully explains the similarities and key differences between the two standards and what they each have to offer.• 6 min