Articles by Tag #identity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Crafting Your Developer Identity: A Blueprint for 2024 🌟

In 2024, building a personal brand isn’t just about flexing your coding muscles 💪. It’s about...

Learn More 217 43Aug 21 '24

Exploring the full potential of the Logto Management API

In this article, we will reemphasize the definition of the Logto Management API, explain how it...

Learn More 33 0Jun 20 '24

Color palette in branding: How Logto generate a custom color scheme for your brand

How audiences perceive a brand is strongly influenced by color psychology. By using a carefully...

Learn More 32 1Aug 28 '24

Crafting a social connector for Logto

Learn how to create a custom social connector for Logto in just a few steps. ...

Learn More 31 0Jun 24 '24

Tenancy models for a multi-tenant app

Taking a deeper dive into the notion of "multi-tenancy" and sharing our insights on how we perceive...

Learn More 29 2Jun 5 '24

Farewell MongoDB: 5 reasons why you only need PostgreSQL

Discuss the reasons why you should consider PostgreSQL over MongoDB for your next project. ...

Learn More 29 0Jul 2 '24

Create a remark plugin to extract MDX reading time

A guide to create a remark plugin to make the reading time data available when importing MDX files as...

Learn More 28 0Aug 28 '24

Opaque token vs JWT

Understand the differences between opaque tokens and JWTs, their use cases, and how they are...

Learn More 27 0Sep 11 '24

Little tricks to improve your customer onboarding experience

Learn how to enhance the user sign-up experience with Logto authentication parameters. At Logto,...

Learn More 26 0Aug 2 '24

RBAC and ABAC: The access control models you should know

Role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most...

Learn More 26 1Jul 9 '24

Understanding OIDC back-channel logout

Learn how OIDC back-channel logout works and why it is important in modern identity solutions. ...

Learn More 25 2Jun 17 '24

Why single sign-on (SSO) is better

Single sign-on (SSO) is a great way to simplify the authentication model and improve the user...

Learn More 25 1Jun 26 '24

One-click MFA integration: Software OTP, Passkey, and backup code

Learn how to integrate MFA into your sign-in experience with one-click. In the digital world,...

Learn More 25 0Jun 4 '24

Everything you need to know about Base64

Dive deep into the world of Base64 encoding. Learn its history, how it works, when to use it, and its...

Learn More 25 1Aug 20 '24

The fastest way to build an authentication system

Slash authentication setup time to under one hour with Logto! With no-code integration, a free...

Learn More 24 3Jul 19 '24

When should I use JWTs?

A comprehensive guide on the pros and cons of using JWTs for authentication, with emphasis on auth...

Learn More 24 1Sep 4 '24

5 go-to-market lessons I learned from driving a developer-led growth product

Lessons and practices learned in driving Logto’s growth with developers. Logto is an open-source,...

Learn More 24 0Sep 19 '24

Use React.lazy with confidence: A safe way to load components when iterating fast

React.lazy is a great way to load components on demand and improve the performance of your app....

Learn More 24 1Aug 2 '24

Bring your own sign-in UI to Logto Cloud

This tutorial will guide you through the process of creating and deploying your own custom sign-in UI...

Learn More 23 0Sep 3 '24

Is magic link sign-in dying? A closer look at its declining popularity

Magic link sign-in is a convenient and secure way to authenticate users. However, its popularity has...

Learn More 22 2Aug 5 '24

Personal access tokens, machine-to-machine authentication, and API Keys definition and their real-world scenarios

Learn the differences between Personal Access Tokens (PATs), Machine-to-Machine (M2M) authentication,...

Learn More 22 1Aug 2 '24

Crafting a Node.js based framework SDK for Logto in minutes

Learn how to create a custom SDK for Logto using @logto/node. Previously in this article, we...

Learn More 21 0Jul 2 '24

How does the browser process the URL input in the address bar?

When we open a particular URL in the browser, how does the browser load and display the content? We...

Learn More 20 1Aug 20 '24

Tenant isolation in multi-tenant application

Tenant isolation is a key concept in multi-tenant applications. In this article, we'll discuss what...

Learn More 19 0Jun 6 '24

OAuth 2.1 is Here: What You Need to Know

Since the initial release of OAuth 2.0, the internet has evolved significantly. Security threats have...

Learn More 17 0Jun 21 '24

Understand Just-in-Time provisioning

Just-in-Time provisioning is a process used in identity and access management systems to create user...

Learn More 17 1Jul 9 '24

Are multi-tenant apps = SaaS?

Should all SaaS apps employ multi-tenancy architectures? Can multi-tenancy architectures be applied...

Learn More 17 0Jun 6 '24

OIDC Prompt 101: A simple guide for developers

OIDC prompt is a parameter that can be used to control the behavior of the authentication flow. This...

Learn More 16 1May 15 '24

7 Unexpected Ways Verifiable Credentials are Used Today

"Verifiable Credentials seem niche. Only a small group of technologists would be interested in this,"...

Learn More 15 0Jul 24 '24

Exploring OpenID Connect configuration: Key fields and their uses

Explores the key fields and practical applications of OpenID Connect configuration. In today’s...

Learn More 14 0May 23 '24