Forem

# identity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Breaking Down Identity, Authentication, Authorization & SSO
Cover image for 🔐 Breaking Down Identity, Authentication, Authorization & SSO

🔐 Breaking Down Identity, Authentication, Authorization & SSO

Comments
3 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Cover image for Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
🌍 The Dark Side of Connectivity in a Digital Age
Cover image for 🌍 The Dark Side of Connectivity in a Digital Age

🌍 The Dark Side of Connectivity in a Digital Age

Comments
2 min read
Proving You Are You, Again and Again
Cover image for Proving You Are You, Again and Again

Proving You Are You, Again and Again

Comments
5 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK
Cover image for Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

1
Comments
3 min read
Implementing Continuous Access Control with OpenID CAEP

Implementing Continuous Access Control with OpenID CAEP

1
Comments
4 min read
Code Review and Testing – Lessons Learned (OSD600LAB_1)

Code Review and Testing – Lessons Learned (OSD600LAB_1)

2
Comments
3 min read
AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure
Cover image for AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

16
Comments 16
5 min read
What's the Difference Between Authentication and Authorization?

What's the Difference Between Authentication and Authorization?

5
Comments
2 min read
Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

2
Comments
3 min read
Behind the E-commerce boom: Why auth and identity management matters
Cover image for Behind the E-commerce boom: Why auth and identity management matters

Behind the E-commerce boom: Why auth and identity management matters

Comments
4 min read
Verified Mark Certificate Guide
Cover image for Verified Mark Certificate Guide

Verified Mark Certificate Guide

Comments
2 min read
Understanding OAuth 2.0 and OpenID Connect

Understanding OAuth 2.0 and OpenID Connect

Comments
3 min read
# The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures
Cover image for # The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

# The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

Comments
9 min read
Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

5
Comments
2 min read
Token Delegation and MCP server orchestration for multi-user AI systems

Token Delegation and MCP server orchestration for multi-user AI systems

6
Comments
7 min read
Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS
Cover image for Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS

Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS

1
Comments
7 min read
Ghost in the Network
Cover image for Ghost in the Network

Ghost in the Network

Comments
3 min read
IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

Comments 2
4 min read
What Is LDAP? A Quick Guide + How SafeLine Supports LDAP Auth

What Is LDAP? A Quick Guide + How SafeLine Supports LDAP Auth

6
Comments
2 min read
May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything
Cover image for May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

Comments
4 min read
Proving You Are You When There’s No YOU

Proving You Are You When There’s No YOU

2
Comments 2
5 min read
AWS IAM Identity Center Setup Guide: Secure Console Access Without IAM Users

AWS IAM Identity Center Setup Guide: Secure Console Access Without IAM Users

1
Comments
2 min read
loading...