Authentication

Authentication Articles

Authentication Articles
Avoiding Authentication System Lock-In

Avoiding Authentication System Lock-In

Steps you can take to avoid auth system lock-in include: considering portability, limiting usage, insulating your application with a facade, and having a backup plan.

Common Authentication Implementation Risks And How To Mitigate Them

Common Authentication Implementation Risks And How To Mitigate Them

What are risks of implementing authentication, authorization and user management, and how can you mitigate them?

Decoding How WebAuthn Works

Decoding How WebAuthn Works

A deep dive into the standard of WebAuthn, and how passkeys are bringing passwordless authentication to the masses.

How FusionAuth Simplifies Compliance with MFA Requirements

How FusionAuth Simplifies Compliance with MFA Requirements

Compliance is a broad term, but one thing is for sure, whatever makes it easier is good. Learn how MFA with FusionAuth can ease your compliance journey.

How Passwordless Authentication Works - A Deep Dive

How Passwordless Authentication Works - A Deep Dive

Add passwordless authentication to your application with FusionAuth.

How Single Sign-on (SSO) Works And Why You Should Care

How Single Sign-on (SSO) Works And Why You Should Care

Integrating single sign-on (SSO) into your applications means your users can access all your applications with one set of credentials, such as a username and password, a magic link, or a WebAuthn passkey.

Multi-Factor Authentication (MFA): The Ultimate Guide

Multi-Factor Authentication (MFA): The Ultimate Guide

What is multi-factor authentication and how it works?

Securing Your User Experience with MFA

Securing Your User Experience with MFA

A good user experience (UX) should be table stakes. This article delves into the decisions and processes you'll want to consider when adding multi-factor authentication (MFA) to your application.

The Developer Benefits of Single Sign-On

The Developer Benefits of Single Sign-On

What is Single Sign-On and how can it help developers build successful applications?

The Security Implications Of Passwordless Authentication

The Security Implications Of Passwordless Authentication

Learn about passkeys and other passwordless authentication.

Types Of Kubernetes Auth

Types Of Kubernetes Auth

What are the three levels of Kubernetes authentication?

WebAuthn Explained

WebAuthn Explained

An in-depth look at how WebAuthn can help you add biometric authentication to your website.

Why Login Failures Matter

Why Login Failures Matter

Are you tracking your login failures? Learn about how to track them, why it matters, and what you should do to avoid login failure.

Why Passwordless Authentication Matters in the Age of WebAuthn

Why Passwordless Authentication Matters in the Age of WebAuthn

Uncover the essentials of WebAuthn for secure, passwordless online authentication and its protection against phishing.