zitadel logozitadel logo
  • Pricing
  • Jobs
Star
Sign up

Blog.

ZITADEL on X
  • #features
  • #zitadel_cloud
  • #self_hosting
  • #security
  • #case_studies
  • #pentest
  • #community
  • #engineering
  • #about_us
  • #alternative
  • #imo
  • #open_source
  • How to Manage Authorizations with Role-Based Access Control preview image

    How to Manage Authorizations with Role-Based Access Control

    In this article, you'll learn how RBAC works, what security use cases it enables, and how you can implement it to effectively authorize your users.

    January 12, 2023  • 8 min
  • Browser Fingerprinting: What Is It and Why Is It Used? preview image

    Browser Fingerprinting: What Is It and Why Is It Used?

    Data stored in browsers can be used to identify site visitors and to track their activity. Browser Fingerprinting can reduce fraud and suspicious website traffic.

    January 5, 2023  • 6 min
  • The Best Of ZITADEL 2022 preview image

    The Best Of ZITADEL 2022

    This brief recap showcases the most significant ways ZITADEL has improved in the year 2022. We are profoundly grateful for your trust in ZITADEL!

    December 29, 2022  • 6 min
  • Thermal Attacks - How Heat From Fingertips Can Reveal Passwords preview image

    Thermal Attacks - How Heat From Fingertips Can Reveal Passwords

    While you might be familiar with common hacking methods, such as phishing and malware, researchers have discovered a bizarre new alternative: Thermal Attacks.

    December 22, 2022  • 6 min
  • How to handle silent-login in ZITADEL? preview image

    How to handle silent-login in ZITADEL?

    It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.

    December 20, 2022  • 3 min
  • How Does the Internet of Things Authentication Work? preview image

    How Does the Internet of Things Authentication Work?

    It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.

    December 15, 2022  • 5 min
  • Use ZITADEL as SSO provider for self-hosting preview image

    Use ZITADEL as SSO provider for self-hosting

    In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider

    December 8, 2022  • 7 min
  • Pentest Results H2 / 2022 preview image

    Pentest Results H2 / 2022

    A security analysis of ZITADEL was conducted with an external specialist. Learn more about the scope and results.

    December 1, 2022  • 5 min
  • How the learning assistant Micromate profits from the multi-tenancy power of ZITADEL preview image

    How the learning assistant Micromate profits from the multi-tenancy power of ZITADEL

    Companies and public institutions of various sizes use the learning assistant to bring everyone’s knowledge to the next level with the power of ZITADEL.

    November 29, 2022  • 5 min
  • Simplify Delegated Access Management and Self-Service preview image

    Simplify Delegated Access Management and Self-Service

    Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.

    November 24, 2022  • 8 min
  • What is an Identity Broker? - Everything you need to know  preview image

    What is an Identity Broker? - Everything you need to know

    Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.

    November 17, 2022  • 5 min
  • How to secure your Java application with OpenID Connect preview image

    How to secure your Java application with OpenID Connect

    In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps

    November 10, 2022  • 10 min
  • 1
  • -
  • 4
  • 5
  • 6
  • -
  • 10
zitadel logozitadel logo
Status
ISO 27001 certifiedGDPR certifiedopenid certified
Why
Trust CenterOpen SourceGDPRPricingvs. Keycloakvs. Auth0vs. Firebase
Explore
Get StartedSelf-hostingDocs
RoadmapChangelog
Company
ContactBlogTeamJobsImprintTerms of ServicePrivacy Policy
Copyright © 2025 All rights reserved.