FusionAuth adds authentication, authorization, user management, reporting, analytics and much more in minutes not months.
FusionAuth might be a bit more popular than OAuth. We know about 29 links to it since March 2021 and only 21 links to OAuth. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
FusionAuth is one of the most decorated and successful open-source IAM solutions. It has been downloaded by more than 10 million customers and hosts over 1 million digital identities. - Source: dev.to / 3 months ago
Ideally, I would recommend not handling and storing passwords yourself. It is preferable to use an identity provider (IdP), such as Azure AD B2C, Auth0, or FusionAuth. These systems are designed to manage your users' identity (including their passwords) so you don't have to. You could also use Single Sign-On with cloud providers. - Source: dev.to / 5 months ago
FusionAuth | Senior Java Engineer, Senior TechOps Engineer, Senior Support Engineer | Full-time | Denver CO, USA | https://fusionauth.io FusionAuth is the authentication and authorization platform built for devs, by devs. Our software solves the problem of integrating essential user security without adding risk or distracting from the primary application. Ya know, the one with the features your users want to pay... - Source: Hacker News / 9 months ago
But I rarely see a comprehensive comparison that is current for any of them. And then there are others out there like Teleport and FusionAuth. Source: 11 months ago
This article is based upon a presentation from Dan Moore of FusionAuth. - Source: dev.to / 12 months ago
You want OAuth. You almost certainly want to use Keycloak as your provider. Source: 10 months ago
It's the same as when you get "log in with Google" or "Log in with Facebook" buttons on other sites. You can read about OpenAuth here: https://oauth.net/. Source: 10 months ago
Failure to adhere strictly to battle-tested standards like OAuth or OpenID Connect (OIDC). - Source: dev.to / 11 months ago
In addition to user authentication, BudPay secures its API endpoints using authentication mechanisms such as API keys and OAuth (Open Authorization). These mechanisms ensure that only authorized applications and services can access BudPay's APIs, protecting user data from unauthorized access. - Source: dev.to / 11 months ago
You'll typically need a way for users to authenticate to the service – probably using OAuth if you want them to login with their accounts from an identity provider, such as Google or Facebook. Source: over 1 year ago
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
OpenID - OpenID is a safe, faster and easier way to log in to web sites.
Keycloak - Open Source Identity and Access Management for modern Applications and Services.
Okta - Enterprise-grade identity management for all your apps, users & devices
BugMeNot - BugMeNot is a free Internet service that provides usernames and passwords to allow users to bypass the registration process for websites.
Amazon Cognito - Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. It scales to millions of users and supports sign-in with social identity providers and enterprise identity providers via SAML 2.0.