Blog.
ZITADEL on X- #features
- #zitadel_cloud
- #self_hosting
- #security
- #case_studies
- #pentest
- #community
- #engineering
- #about_us
- #alternative
- #imo
- #open_source

How to Manage Authorizations with Role-Based Access Control
In this article, you'll learn how RBAC works, what security use cases it enables, and how you can implement it to effectively authorize your users.
• 8 min
Browser Fingerprinting: What Is It and Why Is It Used?
Data stored in browsers can be used to identify site visitors and to track their activity. Browser Fingerprinting can reduce fraud and suspicious website traffic.
• 6 min
The Best Of ZITADEL 2022
This brief recap showcases the most significant ways ZITADEL has improved in the year 2022. We are profoundly grateful for your trust in ZITADEL!
• 6 min
Thermal Attacks - How Heat From Fingertips Can Reveal Passwords
While you might be familiar with common hacking methods, such as phishing and malware, researchers have discovered a bizarre new alternative: Thermal Attacks.
• 6 min
How to handle silent-login in ZITADEL?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 3 min
How Does the Internet of Things Authentication Work?
It's important to secure the myriad of connections between the devices in an IoT network and the services they communicate with. This is where IoT authentication plays its vital role. In this article, you'll learn how authentication in IoT works and how you can achieve device authentication in an IoT system.
• 5 min
Use ZITADEL as SSO provider for self-hosting
In this tutorial, you'll learn what benefits SSO brings to the table. You'll learn how to delegate access from a self-hosted Nextcloud service to ZITADEL as an SSO provider
• 7 min
Pentest Results H2 / 2022
A security analysis of ZITADEL was conducted with an external specialist. Learn more about the scope and results.
• 5 min
How the learning assistant Micromate profits from the multi-tenancy power of ZITADEL
Companies and public institutions of various sizes use the learning assistant to bring everyone’s knowledge to the next level with the power of ZITADEL.
• 5 min
Simplify Delegated Access Management and Self-Service
Granting access is complex, and delegating it needs to be done safely. In this guide, you'll learn how to simplify delegated access management and self-service.
• 8 min
What is an Identity Broker? - Everything you need to know
Integrating multiple Identity Providers directly within applications is complex to maintain, time-consuming to set up, and hinders single sign-on of users. Luckily, this problem can be easily solved with the help of an Identity Broker.
• 5 min
How to secure your Java application with OpenID Connect
In this article, you'll learn how to secure your full stack Java application with OIDC. Here, you'll create two simple Spring apps
• 10 min