Blog.
ZITADEL on- #features
- #zitadel_cloud
- #self_hosting
- #security
- #case_studies
- #pentest
- #community
- #engineering
- #about_us
- #alternative
- #imo
- #open_source
Comparing ZITADEL to Firebase
The purpose of this article is to guide readers on what are the differences between ZITADEL and Firebase
• 8 minBuilt with ZITADEL: A Partnership in Fintech Security with Kaspar&
By leveraging ZITADEL, Kaspar& has successfully enhanced the user experience and security for B2C customers interacting with their mobile app.
• 8 minWhy an Authentication Solution Is Crucial for GDPR Compliance
This article discusses the role of identity (IAM) vendors in becoming GDPR compliant and the responsibilities of data processors and controllers.
• 5 minZITADEL's New and Improved User Onboarding Process
This post explains what's new in ZITADEL's user onboarding process.
• 4 minConfiguring Custom Claims in ZITADEL
This article demonstrates how to add custom claims to your tokens through customizable actions.
• 5 minAPI Access and Token Introspection with OpenId Connect in ZITADEL
This follow-up article demonstrates how to use ZITADEL to secure APIs and how back-end applications can access these protected APIs.
• 10 minOIDC Version 2.0 Release
We have released version 2.0 of our OpenID Connect library, which includes many changes.
• 2 minSocial Engineering - How Hackers are Manipulating You
This article discusses the six most commonly encountered social engineering tactics and how to protect your account from cybercriminals.
• 6 minSecure Logins and Resource Access with ZITADEL and OpenID Connect - Part 2
This follow-up article shows how a Web Application and a Single Page Application can securely authenticate end-users and gain access to protected resources using ZITADEL and OIDC.
• 9 minSecure Logins and Resource Access with ZITADEL and OpenID Connect - Part 1
This article explains how applications can securely authenticate end users and control application access to protected resources using ZITADEL and OpenID Connect.
• 9 minHow Attackers Bypass Two-factor Authentication (2FA)
This article discusses five typical methods attackers use to bypass two-step verification or two-factor authentication and some precautions you may take to protect your account.
• 7 minBuilt with ZITADEL: Improved User Experience and Security for Chapati Systems
Chapati Systems uses self-hosted instances of ZITADEL for centralized user and access management for both internal users and external customers.
• 7 min