Authentication

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

5 Reasons You Want an Out-of-the-Box Identity Service

Whether you’re building a new app or migrating a legacy app to the cloud, you face a choice: build everything in-house or selectively use out-of-the-box services to make the job easier and faster. Out-of-the-box services like Twilio, for messaging, and Braintree, for payments, have gained popularity because they help lean dev teams remain agile…

What Is Social Login and Is It Worth Implementing?

Social login, also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation. For users, social login is a…

The Path to Continuous Authentication: Solving the Best of Breed Problem

For years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need…

How Thoughtworks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

Thoughtworks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, Thoughtworks TechOps Head of Technology, says it was a long time coming. Thoughtworks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

The Secret Features of Okta Access Gateway: Part 4: Anonymous Access

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

The Dogfooding Chronicles: WebAuthN—The Path to Passwordless

  In this edition of The Dogfooding Chronicles, we’re going to highlight an implementation we’re very excited about around here. Ever heard of WebAuthN? Read on to learn some tips and tricks we’ve learned in our WebAuthN enablement journey. Setting the stage – what is WebAuthN? Web Authentication API, aka WebAuthN, is one of the newest web…

Never Do Your Own Taxes—or Your Own Auth! (Mostly)

It’s Tax Day. A day of dread for some, an annual routine for others. Can you think of any other financially impactful space where a DIY vs professional choice is so widely debated? Sure, when you’re just starting out, you can do a lot of things on your own without too much damage. But as you grow and obtain new assets, you may want to hire…

Archive