Forem

# identity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
🔐 Breaking Down Identity, Authentication, Authorization & SSO
Cover image for 🔐 Breaking Down Identity, Authentication, Authorization & SSO

🔐 Breaking Down Identity, Authentication, Authorization & SSO

Comments
3 min read
Let's Sketch Identity: Authentication vs. Authorization
Cover image for Let's Sketch Identity: Authentication vs. Authorization

Let's Sketch Identity: Authentication vs. Authorization

6
Comments
8 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Cover image for Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
🌍 The Dark Side of Connectivity in a Digital Age
Cover image for 🌍 The Dark Side of Connectivity in a Digital Age

🌍 The Dark Side of Connectivity in a Digital Age

Comments
2 min read
Proving You Are You, Again and Again
Cover image for Proving You Are You, Again and Again

Proving You Are You, Again and Again

Comments
5 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK
Cover image for Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

Building Digital Identity Tools - Why We Open-Sourced Our SSI SDK

1
Comments
3 min read
Implementing Continuous Access Control with OpenID CAEP

Implementing Continuous Access Control with OpenID CAEP

1
Comments
4 min read
Code Review and Testing – Lessons Learned (OSD600LAB_1)

Code Review and Testing – Lessons Learned (OSD600LAB_1)

2
Comments
3 min read
AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure
Cover image for AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

AI Identity Transfer: From Character.AI to Self-Hosted Infrastructure

17
Comments 16
5 min read
What's the Difference Between Authentication and Authorization?

What's the Difference Between Authentication and Authorization?

5
Comments
2 min read
Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

Secure Your .NET 8 APIs in Minutes with OpenIddict: A Minimalist's Guide

1
Comments
3 min read
Behind the E-commerce boom: Why auth and identity management matters
Cover image for Behind the E-commerce boom: Why auth and identity management matters

Behind the E-commerce boom: Why auth and identity management matters

Comments
4 min read
Verified Mark Certificate Guide
Cover image for Verified Mark Certificate Guide

Verified Mark Certificate Guide

Comments
2 min read
Understanding OAuth 2.0 and OpenID Connect

Understanding OAuth 2.0 and OpenID Connect

Comments
3 min read
# The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures
Cover image for # The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

# The Chain of Trust in X.500 Digital Certificates: Power, Control, and Real-World Failures

Comments
9 min read
Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

Enterprise-Level Identity Auth in a Self-Hosted WAF, SafeLine (and it's Free)

5
Comments
2 min read
Token Delegation and MCP server orchestration for multi-user AI systems

Token Delegation and MCP server orchestration for multi-user AI systems

6
Comments
7 min read
Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS
Cover image for Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS

Platform Engineering Hands-on Lab #1: Creating Crossplane v1.20 Configuration Packages for Keycloak on AWS

1
Comments
7 min read
Ghost in the Network
Cover image for Ghost in the Network

Ghost in the Network

Comments
3 min read
IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

Comments 2
4 min read
What Is LDAP? A Quick Guide + How SafeLine Supports LDAP Auth

What Is LDAP? A Quick Guide + How SafeLine Supports LDAP Auth

6
Comments
2 min read
May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything
Cover image for May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

Comments
4 min read
loading...