Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
In 2024, building a personal brand isn’t just about flexing your coding muscles 💪. It’s about...
How audiences perceive a brand is strongly influenced by color psychology. By using a carefully...
Learn how to create a custom social connector for Logto in just a few steps. ...
Discuss the reasons why you should consider PostgreSQL over MongoDB for your next project. ...
A guide to create a remark plugin to make the reading time data available when importing MDX files as...
Concurrency in Go is fun… until duplicate work starts hammering your backend. I’m still pretty new...
Understand the differences between opaque tokens and JWTs, their use cases, and how they are...
Learn how to enhance the user sign-up experience with Logto authentication parameters. At Logto,...
Role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most...
Single sign-on (SSO) is a great way to simplify the authentication model and improve the user...
Dive deep into the world of Base64 encoding. Learn its history, how it works, when to use it, and its...
Lessons and practices learned in driving Logto’s growth with developers. Logto is an open-source,...
A comprehensive guide on the pros and cons of using JWTs for authentication, with emphasis on auth...
React.lazy is a great way to load components on demand and improve the performance of your app....
Slash authentication setup time to under one hour with Logto! With no-code integration, a free...
This tutorial will guide you through the process of creating and deploying your own custom sign-in UI...
Learn the differences between Personal Access Tokens (PATs), Machine-to-Machine (M2M) authentication,...
Magic link sign-in is a convenient and secure way to authenticate users. However, its popularity has...
Learn how to create a custom SDK for Logto using @logto/node. Previously in this article, we...
When we open a particular URL in the browser, how does the browser load and display the content? We...
Just-in-Time provisioning is a process used in identity and access management systems to create user...
"Verifiable Credentials seem niche. Only a small group of technologists would be interested in this,"...
For some time now, configuring Single Sign-On (SSO) profiles in AWS CLI has been simplified thanks to...
Learn how to use Postman to obtain a machine-to-machine access token and call Logto management API in...
Building a multi-tenant application presents unique challenges, especially when it comes to managing...
What is user impersonation? User impersonation is anything that allows your systems to...
The internet has undergone massive transformations over the years, evolving from a static information...
Security is a very important aspect in web development, sometimes so much underrated. While naming...
Quick Overview: LinkedIn, like many social media platforms, requires a period of time to...
Any time you’re connecting APIs, you have to consider security implications. The same is true for...