Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
In 2024, building a personal brand isn’t just about flexing your coding muscles 💪. It’s about...
In this article, we will reemphasize the definition of the Logto Management API, explain how it...
How audiences perceive a brand is strongly influenced by color psychology. By using a carefully...
Learn how to create a custom social connector for Logto in just a few steps. ...
Taking a deeper dive into the notion of "multi-tenancy" and sharing our insights on how we perceive...
Discuss the reasons why you should consider PostgreSQL over MongoDB for your next project. ...
A guide to create a remark plugin to make the reading time data available when importing MDX files as...
Understand the differences between opaque tokens and JWTs, their use cases, and how they are...
Learn how to enhance the user sign-up experience with Logto authentication parameters. At Logto,...
Role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most...
Learn how OIDC back-channel logout works and why it is important in modern identity solutions. ...
Single sign-on (SSO) is a great way to simplify the authentication model and improve the user...
Learn how to integrate MFA into your sign-in experience with one-click. In the digital world,...
Dive deep into the world of Base64 encoding. Learn its history, how it works, when to use it, and its...
Slash authentication setup time to under one hour with Logto! With no-code integration, a free...
A comprehensive guide on the pros and cons of using JWTs for authentication, with emphasis on auth...
Lessons and practices learned in driving Logto’s growth with developers. Logto is an open-source,...
React.lazy is a great way to load components on demand and improve the performance of your app....
This tutorial will guide you through the process of creating and deploying your own custom sign-in UI...
Magic link sign-in is a convenient and secure way to authenticate users. However, its popularity has...
Learn the differences between Personal Access Tokens (PATs), Machine-to-Machine (M2M) authentication,...
Learn how to create a custom SDK for Logto using @logto/node. Previously in this article, we...
When we open a particular URL in the browser, how does the browser load and display the content? We...
Tenant isolation is a key concept in multi-tenant applications. In this article, we'll discuss what...
Since the initial release of OAuth 2.0, the internet has evolved significantly. Security threats have...
Just-in-Time provisioning is a process used in identity and access management systems to create user...
Should all SaaS apps employ multi-tenancy architectures? Can multi-tenancy architectures be applied...
OIDC prompt is a parameter that can be used to control the behavior of the authentication flow. This...
"Verifiable Credentials seem niche. Only a small group of technologists would be interested in this,"...
Explores the key fields and practical applications of OpenID Connect configuration. In today’s...