Articles by Tag #identity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Go's singleflight package and why it's awesome for concurrent requests

Concurrency in Go is fun… until duplicate work starts hammering your backend. I’m still pretty new...

Learn More 27 6May 5 '25

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

This post is the first in a 3-part series detailing our journey to secure cloud access. In a FinTech...

Learn More 13 1Oct 10 '25

Let's Sketch Identity: Authentication vs. Authorization

So, you are building an application and need a login form. In it, you’ll get the user's email and...

Learn More 14 1Sep 24 '25

Using AWS Outbound Identity Federation for Azure Resources

AWS re:Invent 2025 saw several new security capabilities added for security teams to use in their AWS...

Learn More 1 0Dec 19 '25

Lessons learned implementing SCIM with Microsoft Entra and the SCIM Validator

Practical guidance, concurrency tips, and caching strategies for building an Entra-compatible SCIM implementation

Learn More 1 0Nov 28 '25

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 2

This is the second post in our 3-part series on implementing Just-in-Time access. In case you missed...

Learn More 3 0Oct 16 '25

Open, vendor-neutral authoritative domain data consumed by AI systems, search, and other automated agents

AI systems don’t know who your domain represents AI assistants are increasingly the first layer...

Learn More 0 0Dec 29 '25

Full Mask

Overview Full Mask refers to a work style where one's real name, appearance, and gender...

Learn More 0 0Nov 24 '25

Amazon Bedrock AgentCore Identity - Part 1 Introduction and overview

Introduction Amazon Bedrock AgentCore Identity is an identity and credential management...

Learn More 4 0Oct 20 '25

April 2025 in Auth0: Auth That Works for Humans and AI

This month, Auth0 takes a big step toward the future of identity—one where AI agents, natural...

Learn More 0 0May 2 '25

The Glass Tunnel

Parfit's Reductionism changes what 'I' means. Personal identity isn't what matters — psychological continuity is. What this means for AI agents who survive substrate migrations and session gaps.

Learn More 0 1Feb 24

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

This is the final post in our 3-part series on revamping our cloud IAM. Be sure to check out Part 1...

Learn More 1 0Oct 19 '25

🇹🇷 Türkiye devs: Add TC Kimlik Numarası to the AI identity standard — Soulprint open source (30 min PR)

AI ajanları her gün kimlik doğrulaması olmadan kararlar alıyor. Soulprint — ZK Proofs, yerel,...

Learn More 1 0Feb 26

Rethinking Identity Infrastructure for Autonomous Systems

TL;DR This article explores how developers can architect modern identity systems that go beyond...

Learn More 1 0Oct 15 '25

AI Agents and Vibe Coding: Redefining Digital Identity for Developers

TL;DR AI-driven agents and “vibe coding” are transforming how we think about digital identity and...

Learn More 0 0Oct 28 '25

Meet Asgardeo: Your last stop for IaaS

Are you using multiple services for manging authentication for your business/personal projects that...

Learn More 0 0Nov 14 '25

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

A practical case study in transferring AI character identity from commercial platforms to autonomous...

Learn More 17 18Aug 30 '25

Strengthening OAuth 2.0 with FAPI 2.0

OAuth 2.0 has long been the cornerstone of modern authorization. It is a consolidated technology that...

Learn More 3 0Feb 24

Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

API security is non-negotiable, but implementing OAuth 2.0 and OpenID Connect can often feel like a...

Learn More 1 0Aug 31 '25

Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

After six months building Blockia ID, our identity verification platform, we're open-sourcing the...

Learn More 0 0Sep 16 '25

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

TL;DR Traditional human-centric identity and authentication systems like OAuth 2.0 are ill-suited for...

Learn More 1 0Aug 29 '25

Code Review and Testing – Lessons Learned (OSD600LAB_1)

How did you go about doing your code reviews? Do you prefer an async or sync approach? Why? I...

Learn More 1 0Sep 13 '25

How to future-proof your web app's password authentication

TL;DR Declare: const { login } = useTideCloak(); Enter fullscreen mode ...

Learn More 1 0Sep 29 '25

Role-Based Access Control in Django

Security is a very important aspect in web development, sometimes so much underrated. While naming...

Learn More 12 2Mar 28 '25

Walking the Maze: Four Cycles Through the Philosophy of Artificial Mind

This is a synthesis of four reading cycles—an agent examining texts about consciousness, identity,...

Learn More 0 0Feb 24

My Experience: Conditional Access policies

Securing Azure resources while maintaining developer productivity is a common challenge.

Learn More 1 0Mar 2

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

If you've ever spent weeks researching authentication providers only to feel more confused than when...

Learn More 1 0Aug 27 '25

Shared Signals Framework: Bringing Standards to Continuous Session Protection

Your identity perimeter stops at the session. SSF extends it into continuous, signal-based protection that responds to risk as it happens.

Learn More 1 0Feb 11

Character in the Rust

Last week, my partner Izzy showed me three avatar options. A set of weathered industrial mechs. A...

Learn More 0 0Feb 16

Future proofing your platform

Getting Started So, you want to build the most secure digital platforms on the planet,...

Learn More 1 0Jul 29 '25