Articles by Tag #identity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Go's singleflight package and why it's awesome for concurrent requests

Concurrency in Go is fun… until duplicate work starts hammering your backend. I’m still pretty new...

Learn More 27 6May 5 '25

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

This post is the first in a 3-part series detailing our journey to secure cloud access. In a FinTech...

Learn More 13 1Oct 10 '25

Let's Sketch Identity: Authentication vs. Authorization

So, you are building an application and need a login form. In it, you’ll get the user's email and...

Learn More 14 1Sep 24 '25

Using AWS Outbound Identity Federation for Azure Resources

AWS re:Invent 2025 saw several new security capabilities added for security teams to use in their AWS...

Learn More 1 0Dec 19 '25

Lessons learned implementing SCIM with Microsoft Entra and the SCIM Validator

Practical guidance, concurrency tips, and caching strategies for building an Entra-compatible SCIM implementation

Learn More 1 0Nov 28 '25

Open, vendor-neutral authoritative domain data consumed by AI systems, search, and other automated agents

AI systems don’t know who your domain represents AI assistants are increasingly the first layer...

Learn More 0 0Dec 29 '25

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 2

This is the second post in our 3-part series on implementing Just-in-Time access. In case you missed...

Learn More 3 0Oct 16 '25

Full Mask

Overview Full Mask refers to a work style where one's real name, appearance, and gender...

Learn More 0 0Nov 24 '25

Amazon Bedrock AgentCore Identity - Part 1 Introduction and overview

Introduction Amazon Bedrock AgentCore Identity is an identity and credential management...

Learn More 4 0Oct 20 '25

April 2025 in Auth0: Auth That Works for Humans and AI

This month, Auth0 takes a big step toward the future of identity—one where AI agents, natural...

Learn More 0 0May 2 '25

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

This is the final post in our 3-part series on revamping our cloud IAM. Be sure to check out Part 1...

Learn More 1 0Oct 19 '25

The 5 Identity Controls Every Modern Enterprise Is Missing in 2025

Production-ready SailPoint IdentityIQ / IdentityNow rule templates we ship to every client –...

Learn More 0 0Dec 5 '25

Rethinking Identity Infrastructure for Autonomous Systems

TL;DR This article explores how developers can architect modern identity systems that go beyond...

Learn More 1 0Oct 15 '25

AI Agents and Vibe Coding: Redefining Digital Identity for Developers

TL;DR AI-driven agents and “vibe coding” are transforming how we think about digital identity and...

Learn More 0 0Oct 28 '25

Meet Asgardeo: Your last stop for IaaS

Are you using multiple services for manging authentication for your business/personal projects that...

Learn More 0 0Nov 14 '25

Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

API security is non-negotiable, but implementing OAuth 2.0 and OpenID Connect can often feel like a...

Learn More 1 0Aug 31 '25

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

A practical case study in transferring AI character identity from commercial platforms to autonomous...

Learn More 17 18Aug 30 '25

Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

After six months building Blockia ID, our identity verification platform, we're open-sourcing the...

Learn More 0 0Sep 16 '25

Code Review and Testing – Lessons Learned (OSD600LAB_1)

How did you go about doing your code reviews? Do you prefer an async or sync approach? Why? I...

Learn More 1 0Sep 13 '25

How to future-proof your web app's password authentication

TL;DR Declare: const { login } = useTideCloak(); Enter fullscreen mode ...

Learn More 1 0Sep 29 '25

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

TL;DR Traditional human-centric identity and authentication systems like OAuth 2.0 are ill-suited for...

Learn More 1 0Aug 29 '25

Role-Based Access Control in Django

Security is a very important aspect in web development, sometimes so much underrated. While naming...

Learn More 12 2Mar 28 '25

The Risks of User Impersonation

What is user impersonation? User impersonation is anything that allows your systems to...

Learn More 11 0Jan 24 '25

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

If you've ever spent weeks researching authentication providers only to feel more confused than when...

Learn More 1 0Aug 27 '25

New AWS Management Console Feature: Simultaneous Sign-in for Multiple Identities

The AWS Management Console now supports simultaneous sign-in for multiple AWS accounts AWS...

Learn More 2 0Jan 26 '25

Future proofing your platform

Getting Started So, you want to build the most secure digital platforms on the planet,...

Learn More 1 0Jul 29 '25

Modernize SAML Web Architectures the Right Way

Many existing websites use legacy web architectures and outdated security solutions. One example is...

Learn More 0 0Nov 6 '25

How long does LinkedIn take to verify identity?

Quick Overview: LinkedIn, like many social media platforms, requires a period of time to...

Learn More 8 0Apr 3 '25

Getting Authentication Right is Critical to Running MCP Servers

Any time you’re connecting APIs, you have to consider security implications. The same is true for...

Learn More 10 0Apr 14 '25

AI Just Killed the Password: Why Adaptive Identity is the Future of Security

For decades, IAM relied on static credentials and fixed permissions. Today, AI-powered...

Learn More 1 0Nov 24 '25