Developing RESTful APIs with Lumen (A PHP Micro-framework)
Lumen is a PHP micro-framework built to deliver microservices and blazing fast APIs. Learn how to build and secure RESTful APIs with Lumen
The Role of CIAM in Implementing a Sound Paywall Strategy
Customer identity and management technology plays an important role with media and publishing companies as they optimize their paywalls to convert more subscribers.
A comprehensive guide to connect to Amazon Redshift from R
A guide through the available drivers and tools to make your life easier when using Amazon Redshift from R and/or RStudio
Developing and Publishing an NPM Package
Learn, through a practical tutorial, what tools we can leverage to develop and publish high-quality NPM packages.
Developing RESTful APIs with Hapi
Hapi 17 brings major changes to the server framework for Node.js. Learn what's new and how to build and secure RESTful APIs with Hapi
Retail Analytics: Past, Present, and Future
Auth0 explores the Data-Driven approach to eCommerce and how retail analytics can help you optimize procurement, merchandising, and marketing
Why Your IAM's Definition Of “User” Could Be Costing You Millions
Because paying “per user” doesn't factor in activity levels, you could be drastically overpaying
Elixir & Phoenix Tutorial: Build an Authenticated App
You can't escape Phoenix if you're looking for a good framework to build on when using Elixir.
Our Journey toward SaaS Customization and Extensibility at Auth0
Learn about the four-year-long journey Auth0 took to deliver the tools needed by both field engineers and our customers to implement last mile identity solutions quickly.
Authentication Provider Best Practices: Universal Login
Learn why universal login is the most secure, standards-based strategy when authenticating with a provider.
Auth0 Names Eugenio Pace as New CEO
Pace to continue momentum of company's exponential growth
Business Identity Theft Is On The Rise
What you need to do to make sure that your company is secure.
How Poor Identity Access Management Equals Security Breaches
Your Expensive Cybersecurity System Might Have a Gaping Hole