Articles by Tag #identity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Crafting Your Developer Identity: A Blueprint for 2024 🌟

In 2024, building a personal brand isn’t just about flexing your coding muscles 💪. It’s about...

Learn More 217 43Aug 21 '24

Color palette in branding: How Logto generate a custom color scheme for your brand

How audiences perceive a brand is strongly influenced by color psychology. By using a carefully...

Learn More 32 1Aug 28 '24

Crafting a social connector for Logto

Learn how to create a custom social connector for Logto in just a few steps. ...

Learn More 31 0Jun 24 '24

Farewell MongoDB: 5 reasons why you only need PostgreSQL

Discuss the reasons why you should consider PostgreSQL over MongoDB for your next project. ...

Learn More 29 0Jul 2 '24

Create a remark plugin to extract MDX reading time

A guide to create a remark plugin to make the reading time data available when importing MDX files as...

Learn More 28 0Aug 28 '24

Go's singleflight package and why it's awesome for concurrent requests

Concurrency in Go is fun… until duplicate work starts hammering your backend. I’m still pretty new...

Learn More 27 6May 5

Opaque token vs JWT

Understand the differences between opaque tokens and JWTs, their use cases, and how they are...

Learn More 27 0Sep 11 '24

Little tricks to improve your customer onboarding experience

Learn how to enhance the user sign-up experience with Logto authentication parameters. At Logto,...

Learn More 26 0Aug 2 '24

RBAC and ABAC: The access control models you should know

Role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most...

Learn More 26 1Jul 9 '24

Why single sign-on (SSO) is better

Single sign-on (SSO) is a great way to simplify the authentication model and improve the user...

Learn More 25 1Jun 26 '24

Everything you need to know about Base64

Dive deep into the world of Base64 encoding. Learn its history, how it works, when to use it, and its...

Learn More 25 1Aug 20 '24

5 go-to-market lessons I learned from driving a developer-led growth product

Lessons and practices learned in driving Logto’s growth with developers. Logto is an open-source,...

Learn More 24 0Sep 19 '24

When should I use JWTs?

A comprehensive guide on the pros and cons of using JWTs for authentication, with emphasis on auth...

Learn More 24 1Sep 4 '24

Use React.lazy with confidence: A safe way to load components when iterating fast

React.lazy is a great way to load components on demand and improve the performance of your app....

Learn More 24 1Aug 2 '24

The fastest way to build an authentication system

Slash authentication setup time to under one hour with Logto! With no-code integration, a free...

Learn More 24 3Jul 19 '24

Bring your own sign-in UI to Logto Cloud

This tutorial will guide you through the process of creating and deploying your own custom sign-in UI...

Learn More 23 0Sep 3 '24

Personal access tokens, machine-to-machine authentication, and API Keys definition and their real-world scenarios

Learn the differences between Personal Access Tokens (PATs), Machine-to-Machine (M2M) authentication,...

Learn More 22 1Aug 2 '24

Is magic link sign-in dying? A closer look at its declining popularity

Magic link sign-in is a convenient and secure way to authenticate users. However, its popularity has...

Learn More 22 2Aug 5 '24

Crafting a Node.js based framework SDK for Logto in minutes

Learn how to create a custom SDK for Logto using @logto/node. Previously in this article, we...

Learn More 21 0Jul 2 '24

How does the browser process the URL input in the address bar?

When we open a particular URL in the browser, how does the browser load and display the content? We...

Learn More 20 1Aug 20 '24

Understand Just-in-Time provisioning

Just-in-Time provisioning is a process used in identity and access management systems to create user...

Learn More 17 1Jul 9 '24

7 Unexpected Ways Verifiable Credentials are Used Today

"Verifiable Credentials seem niche. Only a small group of technologists would be interested in this,"...

Learn More 15 0Jul 24 '24

Simplified Configuration of SSO Profiles in AWS CLI Using SSO Sessions

For some time now, configuring Single Sign-On (SSO) profiles in AWS CLI has been simplified thanks to...

Learn More 13 0Nov 23 '24

Obtain M2M access tokens in minutes with Postman

Learn how to use Postman to obtain a machine-to-machine access token and call Logto management API in...

Learn More 13 0Jul 16 '24

Implementing ASP.NET Identity for a Multi-Tenant Application: Best Practices

Building a multi-tenant application presents unique challenges, especially when it comes to managing...

Learn More 11 0Sep 23 '24

The Risks of User Impersonation

What is user impersonation? User impersonation is anything that allows your systems to...

Learn More 11 0Jan 24

The Future of Web: How Web5 Transforms Identity and Data OwnerShip

The internet has undergone massive transformations over the years, evolving from a static information...

Learn More 11 1Oct 5 '24

Role-Based Access Control in Django

Security is a very important aspect in web development, sometimes so much underrated. While naming...

Learn More 9 2Mar 28

How long does LinkedIn take to verify identity?

Quick Overview: LinkedIn, like many social media platforms, requires a period of time to...

Learn More 9 0Apr 3

Getting Authentication Right is Critical to Running MCP Servers

Any time you’re connecting APIs, you have to consider security implications. The same is true for...

Learn More 8 0Apr 14