All posts/ #engineering
From Persona-based to Resource-based: Rethinking ZITADELs API Design
We decided to adopt a resource-based API for ZITADEL in response to feedback from our customers and community members.
• 4 minComparing ZITADEL to Firebase
The purpose of this article is to guide readers on what are the differences between ZITADEL and Firebase
• 8 minConfiguring Custom Claims in ZITADEL
This article demonstrates how to add custom claims to your tokens through customizable actions.
• 5 minAPI Access and Token Introspection with OpenId Connect in ZITADEL
This follow-up article demonstrates how to use ZITADEL to secure APIs and how back-end applications can access these protected APIs.
• 10 minOIDC Version 2.0 Release
We have released version 2.0 of our OpenID Connect library, which includes many changes.
• 2 minIncrease Your SPA Security with Cloudflare Workers
In this article, you'll learn about single-page applications, some security issues associated with the approach, and how to improve the security of any SPA site using Cloudflare Workers.
• 12 minUse ZITADEL as SSO provider for self-hosting
In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider
• 7 minSimplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 8 minHow to secure your Java application with OpenID Connect
In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps
• 10 minFull Stack ZITADEL Integration with Next.js
In this tutorial, you'll learn how to set up a Next.js project using JavaScript. You'll also learn how to integrate that with ZITADEL, an open source identity management platform and security layer for your web application.
• 10 minJWT vs. Opaque Tokens
In this article, you'll learn why you need JWT and opaque tokens, what the differences are between the two, and in which case you should select one or the other.
• 5 minWhy Choose an Open Source Authentication Provider
In this article, you'll learn about open source authentication providers, their common use cases, and what your organization stands to gain from adopting an open source authentication solution.
• 5 min