CINXE.COM
Identity Resources - Webinars, eBooks - Auth0
<!DOCTYPE html><html lang="en"><head><title>Identity Resources - Webinars, eBooks - Auth0</title><meta name="viewport" content="initial-scale=1.0, width=device-width"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=5"/><meta name="fragment" content="!"/><meta name="google-site-verification" content="KFViLMGmUy6wD69eTa8DPQhdfDlh_98L7seja7jIUQA"/><meta name="yandex-verification" content="5bf6f6598e8639ca"/><meta name="facebook-domain-verification" content="u12hlura60iag5ysnvf6761lhe6chz"/><meta name="description" content="Learn how we secure and solve the most complex identity use cases with an extensible, easy to integrate platform that powers trillions of logins every year."/><meta property="og:type" content="website"/><meta property="og:title" content="Identity Resources - Webinars, eBooks - Auth0"/><meta property="og:site_name" content="Auth0"/><meta property="og:description" content="Learn how we secure and solve the most complex identity use cases with an extensible, easy to integrate platform that powers trillions of logins every year."/><meta property="og:locale" content="en"/><meta property="og:url" content="https://auth0.com/resources"/><meta property="og:image" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="og:image:secure_url" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="fb:app_id" content="507756515938786"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@auth0"/><meta name="twitter:creator" content="@auth0"/><meta name="twitter:title" content="Identity Resources - Webinars, eBooks - Auth0"/><meta name="twitter:description" content="Learn how we secure and solve the most complex identity use cases with an extensible, easy to integrate platform that powers trillions of logins every year."/><meta name="twitter:image:src" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta name="twitter:image:width" content="1024"/><meta name="twitter:image:height" content="512"/><meta name="theme-color" content="#ffffff"/><meta name="pocket-site-verification" content="d301f9bf5a8414226ceee36fc991e9"/><link rel="canonical" href="https://auth0.com/resources"/><link rel="alternate" hrefLang="en" href="https://auth0.com/resources"/><link rel="alternate" hrefLang="de" href="https://auth0.com/de/resources"/><link rel="alternate" hrefLang="fr" href="https://auth0.com/fr/resources"/><link rel="alternate" hrefLang="ja" href="https://auth0.com/jp/resources"/><link rel="alternate" hrefLang="es" href="https://auth0.com/es/resources"/><link rel="alternate" hrefLang="pt" href="https://auth0.com/pt/resources"/><link rel="alternate" hrefLang="x-default" href="https://auth0.com/resources"/><script type="application/ld+json">{ "@context": "http://schema.org", "@type": "WebPage", "name": "Identity Resources - Webinars, eBooks - Auth0", "description": "Learn how we secure and solve the most complex identity use cases with an extensible, easy to integrate platform that powers trillions of logins every year.", "url": "https://auth0.com/resources", "image": "https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png", "publisher": { "@type": "Organization", "name": "Auth0", "legalName": "Auth0 Inc.", "url": "https://auth0.com/", "logo": "https://cdn.auth0.com/website/home-page/evolution_logo_Auth0_black.svg", "foundingDate": "2013-02-01T00:00:00.000Z", "address": { "@type": "PostalAddress", "streetAddress": "10800 NE 8th Street, Suite 600", "addressLocality": "Bellevue", "addressRegion": "WA", "postalCode": "98004", "addressCountry": "USA" }, "contactPoint": { "@type": "ContactPoint", "contactType": "Customer Support", "telephone": "[+888-235-2699]", "email": "info@auth0.com" }, "sameAs": [ "https://twitter.com/auth0", "https://www.facebook.com/getauth0/", "https://www.linkedin.com/company/auth0" ] } }</script><link rel="preload" href="https://auth0.com/contact-us/api/form-data" as="fetch" crossorigin="use-credentials"/><script> const generateNewContext = () => { return { window: { location: { hash: window.location.hash, host: window.location.host, hostname: window.location.hostname, href: window.location.href, origin: window.location.origin, pathname: window.location.pathname, port: window.location.port, protocol: window.location.protocol, search: window.location.search, }, navigator: { language: window.navigator.language, browserLanguage: window.navigator.browserLanguage, userAgent: window.navigator.userAgent, }, innerHeight: window.innerHeight, innerWidth: window.innerWidth, }, document: { title: document.title, referrer: document.referrer, }, }; }; window.addEventListener('resize', () => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftUpdateContext', data: generateNewContext() }, '*', ); }); window.addEventListener('scroll', (event) => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftParentScroll', data: { scroll: true }, target: 'drift.parentScroll', }, '*', ); }); window.addEventListener('message', function (event) { const iframe = document.getElementById('drift-iframe'); if ( !(iframe && iframe.contentWindow) && event.source === iframe.contentWindow ) { return; } const message = event.data; if (message.type === 'drift:ready') { iframe.contentWindow.postMessage( { type: 'driftSetContext', data: generateNewContext() }, '*', ); } if (message.type === 'drift:resize') { const styles = message.data.styles; for (let key in styles) { if (!styles.hasOwnProperty(key)) { continue; } iframe.style.setProperty(key, styles[key]); } } }); </script><meta name="next-head-count" content="39"/><link rel="shortcut icon mask-icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="16x16" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-16.png"/><link rel="icon" sizes="32x32" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-32.png"/><link rel="icon" sizes="48x48" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="96x96" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-96.png"/><link rel="icon" sizes="144x144" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-144.png"/><link rel="apple-touch-icon" sizes="180x180" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-180.png"/><link rel="stylesheet" type="text/css" href="https://cdn.auth0.com/website/styleguide/core-custom/1.0.3/core.min.css"/><link rel="stylesheet" type="text/css" charSet="UTF-8" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick.min.css"/><link rel="stylesheet" type="text/css" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick-theme.min.css"/><script type="text/plain" class="optanon-category-4">(function (h, o, t, j, a, r) {h.hj = h.hj || function () { (h.hj.q = h.hj.q || []).push(arguments) }; h._hjSettings = { hjid: 301495, hjsv: 5 }; a = o.getElementsByTagName('head')[0]; r = o.createElement('script'); r.async = 1; r.src = t + h._hjSettings.hjid + j + h._hjSettings.hjsv; a.appendChild(r);}(window, document, '//static.hotjar.com/c/hotjar-', '.js?sv='))</script><script type="text/plain" class="optanon-category-4"> window._6si = window._6si || []; window._6si.push(['enableEventTracking', true]); window._6si.push(['setToken', '5400c5b6d4c7c0376f36ed7c5ebbc828']); window._6si.push(['setEndpoint', 'b.6sc.co']); (function() { var gd = document.createElement('script'); gd.type = 'text/javascript'; gd.async = true; gd.src = '//j.6sc.co/6si.min.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(gd, s); })();</script><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/b2b-enterprise-identity-management/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/webpack-9921c1f05c2efb02.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/framework-2fe4cb6473b20297.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/main-0e6c5455930a1b1c.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/pages/_app-e129453826c91d72.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/9236dd9e-6b897330babafd35.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/fec483df-521c76ff9a14386b.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/3339-8a055232aafba6ff.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/1664-df515f0f42a0699e.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/9927-7c42c6c1053de6d9.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/924-10208592250ae0f5.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/6817-25ba8ff6fef84b3c.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/8100-884483109a830fc5.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/3296-500b67a1291626e8.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/4563-1296468bece299f4.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/1344-0c7c5790f9b851a0.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/pages/resources-469ca03b0c0c47c3.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/-HHzxANzsf5uxPS9QLsdm/_buildManifest.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/-HHzxANzsf5uxPS9QLsdm/_ssgManifest.js" defer=""></script><style data-styled="" data-styled-version="5.3.6">html{line-height:1.15;-webkit-text-size-adjust:100%;}/*!sc*/ body{margin:0;}/*!sc*/ main{display:block;}/*!sc*/ h1{font-size:2em;margin:0.67em 0;}/*!sc*/ hr{box-sizing:content-box;height:0;overflow:visible;}/*!sc*/ pre{font-family:monospace,monospace;font-size:1em;}/*!sc*/ a{background-color:transparent;}/*!sc*/ abbr[title]{border-bottom:none;-webkit-text-decoration:underline;text-decoration:underline;-webkit-text-decoration:underline dotted;text-decoration:underline dotted;}/*!sc*/ b,strong{font-weight:bolder;}/*!sc*/ code,kbd,samp{font-family:monospace,monospace;font-size:1em;}/*!sc*/ small{font-size:80%;}/*!sc*/ sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline;}/*!sc*/ sub{bottom:-0.25em;}/*!sc*/ sup{top:-0.5em;}/*!sc*/ img{border-style:none;}/*!sc*/ button,input,optgroup,select,textarea{font-family:inherit;font-size:100%;line-height:1.15;margin:0;}/*!sc*/ button,input{overflow:visible;}/*!sc*/ button,select{text-transform:none;}/*!sc*/ button,[type="button"],[type="reset"],[type="submit"]{-webkit-appearance:button;}/*!sc*/ button::-moz-focus-inner,[type="button"]::-moz-focus-inner,[type="reset"]::-moz-focus-inner,[type="submit"]::-moz-focus-inner{border-style:none;padding:0;}/*!sc*/ button:-moz-focusring,[type="button"]:-moz-focusring,[type="reset"]:-moz-focusring,[type="submit"]:-moz-focusring{outline:1px dotted ButtonText;}/*!sc*/ fieldset{padding:0.35em 0.75em 0.625em;}/*!sc*/ legend{box-sizing:border-box;color:inherit;display:table;max-width:100%;padding:0;white-space:normal;}/*!sc*/ progress{vertical-align:baseline;}/*!sc*/ textarea{overflow:auto;}/*!sc*/ [type="checkbox"],[type="radio"]{box-sizing:border-box;padding:0;}/*!sc*/ [type="number"]::-webkit-inner-spin-button,[type="number"]::-webkit-outer-spin-button{height:auto;}/*!sc*/ [type="search"]{-webkit-appearance:textfield;outline-offset:-2px;}/*!sc*/ [type="search"]::-webkit-search-decoration{-webkit-appearance:none;}/*!sc*/ ::-webkit-file-upload-button{-webkit-appearance:button;font:inherit;}/*!sc*/ details{display:block;}/*!sc*/ summary{display:list-item;}/*!sc*/ template{display:none;}/*!sc*/ [hidden]{display:none;}/*!sc*/ data-styled.g52[id="sc-global-ecVvVt1"]{content:"sc-global-ecVvVt1,"}/*!sc*/ .cJRWJS{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:linear-gradient(81deg,#191919 0%,#383838 100%);border-color:transparent;border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.cJRWJS{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .cJRWJS:active{color:#FFFFFF80;}/*!sc*/ .cJRWJS:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);color:#FFFEFA;background:linear-gradient(79deg,#3F59E4 0%,#4016A0 148.29%);cursor:pointer;}/*!sc*/ .gsHAMX{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:transparent;border-color:#191919;border-radius:0.6rem;border-style:solid;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.gsHAMX{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .gsHAMX:active{color:#FFFFFF80;border-color:#3F59E4;}/*!sc*/ .gsHAMX:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);border-color:#3F59E4;color:#3F59E4;background:transparent;cursor:pointer;}/*!sc*/ .iBRLYD{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-width:0;border-color:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.iBRLYD{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .iBRLYD:active{color:rgba(255,254,250,0.8);border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);background:linear-gradient(0deg,rgba(0,0,0,0.20) 0%,rgba(0,0,0,0.20) 100%),radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .iBRLYD:hover{-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);color:#FFFEFA;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);cursor:pointer;-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .iBRLYD:hover{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .iBRLYD:active{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .iBRLYD span{z-index:3;}/*!sc*/ .iBRLYD:hover{background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);}/*!sc*/ .iBRLYD::before{content:'';width:100%;height:100%;display:inline-block;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);opacity:0;position:absolute;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ .iBRLYD:hover::before{opacity:1;}/*!sc*/ data-styled.g53[id="styled__Button-sc-1hwml9q-0"]{content:"cJRWJS,gsHAMX,iBRLYD,"}/*!sc*/ .cGdNT.cGdNT.cGdNT{color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .dCCmSO.dCCmSO.dCCmSO{width:100%;}/*!sc*/ .isBdzo.isBdzo.isBdzo{margin-top:1.6rem;width:100%;}/*!sc*/ .bHQaKS.bHQaKS.bHQaKS{color:#191919;font-weight:500;line-height:1.8rem;margin-bottom:2.1rem;}/*!sc*/ .fwumGB.fwumGB.fwumGB{-webkit-text-decoration:none;text-decoration:none;line-height:2.2rem;}/*!sc*/ .eDrEVh.eDrEVh.eDrEVh{color:#191919;margin:0;}/*!sc*/ .bdeJQk.bdeJQk.bdeJQk{font-family:Aeonik,sans-serif;color:#1E212A;margin:0.4rem 0 0;font-weight:500;font-size:1.6rem;line-height:2rem;}/*!sc*/ .gtyRnh.gtyRnh.gtyRnh{display:block;color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .BcxXA.BcxXA.BcxXA{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .dFMMlW.dFMMlW.dFMMlW{font-family:Aeonik,sans-serif;color:#686868;font-size:1.4rem;-webkit-letter-spacing:0.015rem;-moz-letter-spacing:0.015rem;-ms-letter-spacing:0.015rem;letter-spacing:0.015rem;line-height:2rem;}/*!sc*/ .ierwBG.ierwBG.ierwBG{color:#191919;}/*!sc*/ .bHOya.bHOya.bHOya{-webkit-text-decoration:none;text-decoration:none;display:block;}/*!sc*/ .blScNC.blScNC.blScNC{margin-right:1.6rem;-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.4rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.blScNC.blScNC.blScNC{padding:0.65rem 2.4rem;}}/*!sc*/ .kRzliz.kRzliz.kRzliz{-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.2rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.kRzliz.kRzliz.kRzliz{padding:0.65rem 2.2rem;}}/*!sc*/ .eHMTIY.eHMTIY.eHMTIY{color:#141414;font-weight:600;line-height:5.4rem;-webkit-letter-spacing:-0.16rem;-moz-letter-spacing:-0.16rem;-ms-letter-spacing:-0.16rem;letter-spacing:-0.16rem;text-align:left;}/*!sc*/ @media screen and (min-width:900px){.eHMTIY.eHMTIY.eHMTIY{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:1200px){.eHMTIY.eHMTIY.eHMTIY{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:900px){.eHMTIY.eHMTIY.eHMTIY{font-size:6rem;}}/*!sc*/ @media screen and (min-width:1200px){.eHMTIY.eHMTIY.eHMTIY{font-size:6rem;}}/*!sc*/ .dLXTcP.dLXTcP.dLXTcP{font-weight:500;}/*!sc*/ .cHhniM.cHhniM.cHhniM{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .hTUVnp.hTUVnp.hTUVnp{color:#80868F;margin:0;}/*!sc*/ .csKyZk.csKyZk.csKyZk{border-top:0.1rem solid #bdc4cf;padding:2.4rem 1.6rem;color:#80868F;margin:0;}/*!sc*/ data-styled.g54[id="utils-sc-11hlfw-0"]{content:"cGdNT,dCCmSO,isBdzo,bHQaKS,fwumGB,eDrEVh,bdeJQk,gtyRnh,BcxXA,dFMMlW,ierwBG,bHOya,blScNC,kRzliz,eHMTIY,dLXTcP,cHhniM,dmQvNV,hTUVnp,csKyZk,"}/*!sc*/ .ieuKTj{margin:0 0 1.6rem 0;color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.ieuKTj{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.ieuKTj{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ .dveEmL{margin:0 0 1.6rem 0;color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.2rem;-webkit-letter-spacing:0.12rem;-moz-letter-spacing:0.12rem;-ms-letter-spacing:0.12rem;letter-spacing:0.12rem;line-height:1.8rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.dveEmL{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.dveEmL{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ data-styled.g58[id="styled__Overline-sc-165cfko-0"]{content:"ieuKTj,dveEmL,"}/*!sc*/ .eievug{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.eievug{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.eievug{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ .fFONwU{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.fFONwU{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.fFONwU{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ .gDDDRz{margin:0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.gDDDRz{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.gDDDRz{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ data-styled.g59[id="styled__Paragraph-sc-165cfko-1"]{content:"eievug,fFONwU,gDDDRz,"}/*!sc*/ .etkYET{margin:0;color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;padding:0;}/*!sc*/ @media screen and (min-width:900px){.etkYET{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;}}/*!sc*/ @media screen and (min-width:1200px){.etkYET{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:4rem;-webkit-letter-spacing:-0.08rem;-moz-letter-spacing:-0.08rem;-ms-letter-spacing:-0.08rem;letter-spacing:-0.08rem;line-height:4.4rem;color:#1E212A;}}/*!sc*/ data-styled.g60[id="styled__Heading-sc-165cfko-2"]{content:"etkYET,"}/*!sc*/ .fOVXAi{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.fOVXAi{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.fOVXAi{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .fOVXAi:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .fOVXAi:active{color:#493FA3;}/*!sc*/ .fOVXAi:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .fOVXAi:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .kVqgZI{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.kVqgZI{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.kVqgZI{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ .kVqgZI:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .kVqgZI:active{color:#493FA3;}/*!sc*/ .kVqgZI:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cUdGaW{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.cUdGaW{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.cUdGaW{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .cUdGaW:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .cUdGaW:active{color:#493FA3;}/*!sc*/ .cUdGaW:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cUdGaW:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .gAIXCo{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.gAIXCo{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.gAIXCo{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .gAIXCo:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .gAIXCo:active{color:#493FA3;}/*!sc*/ .gAIXCo:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .hTVzGn{margin:0;padding:0;font-family:Inter,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.hTVzGn{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.hTVzGn{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .hTVzGn:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .hTVzGn:active{color:#493FA3;}/*!sc*/ .hTVzGn:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ data-styled.g62[id="styled__Link-sc-bubr9x-0"]{content:"fOVXAi,kVqgZI,cUdGaW,gAIXCo,hTVzGn,"}/*!sc*/ :root{--content-width:120rem;--font-main:'fakt-web',sans-serif;}/*!sc*/ body{box-sizing:border-box;font-family:var(--font-main);}/*!sc*/ html{font-size:10px;}/*!sc*/ data-styled.g227[id="sc-global-clike1"]{content:"sc-global-clike1,"}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:400;font-display:swap;src:local('Inter-Regular'), url('https://cdn.auth0.com/website/fonts/Inter-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:500;font-display:swap;src:local('Inter-Medium'), url('https://cdn.auth0.com/website/fonts/Inter-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:700;font-display:swap;src:local('Inter-Bold'), url('https://cdn.auth0.com/website/fonts/Inter-Bold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:500;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-Medium'), url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:600;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-SemiBold'), url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-SemiBold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'RobotoMono';font-style:normal;font-weight:400;font-display:swap;src:local('RobotoMono-Regular'), url('https://cdn.auth0.com/quantum-fonts/lib/0.0.9/roboto-mono/files/roboto-mono-latin-400-normal.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:400;font-display:swap;src:local('Aeonik-Regular'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:400;font-display:swap;src:local('AeonikMono-Regular'), url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:500;font-display:swap;src:local('AeonikMono-Medium'), url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Medium.ttf') format('woff2');}/*!sc*/ data-styled.g228[id="sc-global-bZiXeF1"]{content:"sc-global-bZiXeF1,"}/*!sc*/ html{font-size:62.5%;}/*!sc*/ html h1,html h2,html h3,html h4,html h5,html h6{font-feature-settings:'zero';}/*!sc*/ a:focus{outline:-webkit-focus-ring-color auto 0.2rem;outline-offset:0.1rem;}/*!sc*/ data-styled.g229[id="sc-global-ktqmOE1"]{content:"sc-global-ktqmOE1,"}/*!sc*/ .fahHZk{background:#FFFEFA;display:none;position:fixed;z-index:100;top:10.4rem;bottom:0;left:0;right:0;width:100%;overflow:auto;}/*!sc*/ data-styled.g230[id="sc-48604b4d-0"]{content:"fahHZk,"}/*!sc*/ .dYTUtR{margin-bottom:15rem;padding-left:0;}/*!sc*/ data-styled.g231[id="sc-48604b4d-1"]{content:"dYTUtR,"}/*!sc*/ .bBPBdn{list-style:none;width:100%;border-bottom:0.1rem solid #C5C5C5;}/*!sc*/ .bBPBdn:first-of-type{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g232[id="sc-48604b4d-2"]{content:"bBPBdn,"}/*!sc*/ .UJeau{padding:2.4rem 2rem 2.4rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}/*!sc*/ @media screen and (min-width:900px){.UJeau{padding-left:6.4rem;padding-right:6.4rem;}}/*!sc*/ data-styled.g233[id="sc-48604b4d-3"]{content:"UJeau,"}/*!sc*/ .dcBPNJ{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;display:inline-block;width:100%;}/*!sc*/ .dcBPNJ:hover{color:#3F59E4;}/*!sc*/ data-styled.g234[id="sc-48604b4d-4"]{content:"dcBPNJ,"}/*!sc*/ .iqISjd{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;color:#191919;margin:0;padding:2.4rem 0 2.4rem 1.6rem;position:relative;-webkit-transition:color 0.2s;transition:color 0.2s;}/*!sc*/ .iqISjd::before{border-style:solid;border-width:0.1em 0.1em 0 0;content:'';display:inline-block;height:1.4rem;right:3rem;top:calc(50% - 0.83rem);position:absolute;vertical-align:top;width:1.4rem;-webkit-transform:rotate(135deg);-ms-transform:rotate(135deg);transform:rotate(135deg);-webkit-transition:-webkit-transform 0.4s ease;-webkit-transition:transform 0.4s ease;transition:transform 0.4s ease;}/*!sc*/ @media screen and (min-width:900px){.iqISjd{padding-left:6.4rem;}.iqISjd:before{right:7rem;}}/*!sc*/ data-styled.g235[id="sc-48604b4d-5"]{content:"iqISjd,"}/*!sc*/ .jqBJbC{overflow:hidden;height:auto;-webkit-transition:max-height 0.3s ease-out;transition:max-height 0.3s ease-out;padding-left:1.6rem;background:#F6F7FA;height:0;max-height:0;}/*!sc*/ @media screen and (min-width:900px){.jqBJbC{padding-left:6.4rem;}}/*!sc*/ data-styled.g236[id="sc-48604b4d-6"]{content:"jqBJbC,"}/*!sc*/ .kzEdNm:not(:last-of-type){margin-bottom:3.2rem;}/*!sc*/ .kzEdNm:last-of-type{padding-bottom:1.6rem;}/*!sc*/ data-styled.g237[id="sc-48604b4d-7"]{content:"kzEdNm,"}/*!sc*/ .iDtUXN{font-family:Aeonik Mono,monospace;font-size:1.4rem;line-height:2rem;font-weight:500;-webkit-letter-spacing:0.14rem;-moz-letter-spacing:0.14rem;-ms-letter-spacing:0.14rem;letter-spacing:0.14rem;text-transform:uppercase;color:#8c929c;margin:0 0 2rem;padding-top:3.2rem;}/*!sc*/ data-styled.g238[id="sc-48604b4d-8"]{content:"iDtUXN,"}/*!sc*/ .dIBWQm{list-style:none;padding:0;margin:0;}/*!sc*/ data-styled.g240[id="sc-48604b4d-10"]{content:"dIBWQm,"}/*!sc*/ .dBWnDJ{font-family:Aeonik,sans-serif;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;margin-bottom:2rem;}/*!sc*/ .dBWnDJ a{color:#42464d;display:inline-block;width:100%;}/*!sc*/ .dBWnDJ a:hover{color:#3F59E4;}/*!sc*/ data-styled.g241[id="sc-48604b4d-11"]{content:"dBWnDJ,"}/*!sc*/ .hMidHS{border:none;color:#191919;background:none;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;}/*!sc*/ data-styled.g242[id="sc-48604b4d-12"]{content:"hMidHS,"}/*!sc*/ .bOieih{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g243[id="sc-48604b4d-13"]{content:"bOieih,"}/*!sc*/ .cSezqg{font-weight:500;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;margin:0 0 0 0.8rem;}/*!sc*/ data-styled.g244[id="sc-48604b4d-14"]{content:"cSezqg,"}/*!sc*/ .kJKosn{-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;width:100%;padding:1.6rem;margin:0 auto;border-top:0.1rem solid #C5C5C5;position:fixed;bottom:0;left:0;right:0;text-align:center;background:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:900px){.kJKosn{padding:3.2rem 6.4rem;}}/*!sc*/ data-styled.g245[id="sc-48604b4d-15"]{content:"kJKosn,"}/*!sc*/ .hydWjh{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:1.6rem;}/*!sc*/ data-styled.g248[id="sc-48604b4d-18"]{content:"hydWjh,"}/*!sc*/ .itTgje{background:#242424;color:#FFFEFA;width:100%;margin:auto;font-size:1.4rem;line-height:2rem;text-align:left;font-family:Aeonik,sans-serif;border-bottom:0.1rem solid #41454C;border-bottom:0.2rem solid;border-image-slice:1;border-image-source:linear-gradient( 135deg, #4cb7a3 0%, #3f59e4 50%, #4016a0 100% );}/*!sc*/ @media screen and (min-width:900px){.itTgje{text-align:left;}}/*!sc*/ data-styled.g250[id="sc-5beafa8a-0"]{content:"itTgje,"}/*!sc*/ .fXlPNE{width:100%;max-width:144rem;min-height:4rem;margin:auto;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:1rem 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.fXlPNE{padding:1rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.fXlPNE{padding:0 6.4rem;}}/*!sc*/ data-styled.g251[id="sc-5beafa8a-1"]{content:"fXlPNE,"}/*!sc*/ .gnbkUy{-webkit-flex:1;-ms-flex:1;flex:1;padding:0;cursor:pointer;}/*!sc*/ @media screen and (min-width:900px){.gnbkUy{padding:0;}}/*!sc*/ @media screen and (min-width:1200px){.gnbkUy{padding:0.9rem 0;margin-right:2.4rem;}}/*!sc*/ .gnbkUy:hover .sc-5beafa8a-4{color:#B6CAFF;}/*!sc*/ data-styled.g255[id="sc-5beafa8a-5"]{content:"gnbkUy,"}/*!sc*/ .fGOvxz{display:none;}/*!sc*/ @media screen and (min-width:1200px){.fGOvxz{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}}/*!sc*/ data-styled.g256[id="sc-5beafa8a-6"]{content:"fGOvxz,"}/*!sc*/ .gCDOIN{color:#FFFEFA;cursor:pointer;font-weight:500;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .gCDOIN:focus{outline:none;}/*!sc*/ .gCDOIN:hover,.gCDOIN:focus{color:#B6CAFF;}/*!sc*/ data-styled.g257[id="sc-5beafa8a-7"]{content:"gCDOIN,"}/*!sc*/ .bgMNvC{cursor:pointer;color:#FFFEFA;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .bgMNvC svg{stroke:#FFFEFA;}/*!sc*/ .bgMNvC:hover,.bgMNvC:focus-within{color:#B6CAFF;}/*!sc*/ .bgMNvC:hover svg,.bgMNvC:focus-within svg{stroke:#B6CAFF;}/*!sc*/ data-styled.g258[id="sc-5beafa8a-8"]{content:"bgMNvC,"}/*!sc*/ .iDaiez{line-height:2rem;}/*!sc*/ .iDaiez:hover{color:#493FA3;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g259[id="sc-5beafa8a-9"]{content:"iDaiez,"}/*!sc*/ .flgNuK{height:100%;width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g260[id="sc-5beafa8a-10"]{content:"flgNuK,"}/*!sc*/ .jjbnIz{font-weight:500;-webkit-appearance:none;-moz-appearance:none;appearance:none;height:100%;background-color:transparent;border:none;margin:0;font-family:inherit;font-size:inherit;cursor:inherit;line-height:inherit;color:inherit;z-index:1;outline:none;padding-left:2rem;padding-right:1.6rem;text-align:center;width:100%;}/*!sc*/ data-styled.g261[id="sc-5beafa8a-11"]{content:"jjbnIz,"}/*!sc*/ .gUmNqK{left:0;pointer-events:none;position:absolute;top:calc(50% - 1rem);z-index:0;}/*!sc*/ data-styled.g262[id="sc-5beafa8a-12"]{content:"gUmNqK,"}/*!sc*/ .cJXqJO{-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:100%;pointer-events:none;position:absolute;right:0;z-index:0;}/*!sc*/ data-styled.g263[id="sc-5beafa8a-13"]{content:"cJXqJO,"}/*!sc*/ .eiqtQu{height:10.4rem;width:100%;margin:0 auto;}/*!sc*/ @media screen and (min-width:1200px){.eiqtQu{display:none;}}/*!sc*/ data-styled.g265[id="sc-dd041119-1"]{content:"eiqtQu,"}/*!sc*/ .iaTkkA{height:0.1rem;position:absolute;visibility:hidden;top:0;}/*!sc*/ data-styled.g266[id="sc-dd041119-2"]{content:"iaTkkA,"}/*!sc*/ .dAIDFK{position:fixed;top:0;left:0;width:100%;z-index:1000;color:#191919;}/*!sc*/ data-styled.g267[id="sc-dd041119-3"]{content:"dAIDFK,"}/*!sc*/ .hvNmHd{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g268[id="sc-dd041119-4"]{content:"hvNmHd,"}/*!sc*/ .iDvPUZ{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g269[id="sc-dd041119-5"]{content:"iDvPUZ,"}/*!sc*/ .cdYdvX{-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;display:none;width:100%;max-width:100%;margin:auto;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.cdYdvX{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ .cdYdvX:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g270[id="sc-dd041119-6"]{content:"cdYdvX,"}/*!sc*/ .SNAUb{max-width:131.2rem;width:100%;margin:auto;-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.SNAUb{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;padding:0;}}/*!sc*/ .SNAUb:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g271[id="sc-dd041119-7"]{content:"SNAUb,"}/*!sc*/ .goqQNV{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g272[id="sc-dd041119-8"]{content:"goqQNV,"}/*!sc*/ .irBpqS{max-width:144rem;width:100%;margin:auto;padding:1.2rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;background-color:#FFFEFA;height:6.4rem;box-shadow:inset 0 -0.1rem 0 #C5C5C5;position:relative;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:900px){.irBpqS{padding:1.6rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.irBpqS{display:none;}}/*!sc*/ data-styled.g273[id="sc-dd041119-9"]{content:"irBpqS,"}/*!sc*/ .lmuCEj{justify-self:flex-end;padding:2rem 0;}/*!sc*/ data-styled.g274[id="sc-dd041119-10"]{content:"lmuCEj,"}/*!sc*/ .librYF{-webkit-appearance:none;-moz-appearance:none;appearance:none;border:0;background:transparent;height:2.4rem;margin:0;padding:0;position:relative;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;cursor:pointer;-webkit-transition:all 0.5s ease-in-out;transition:all 0.5s ease-in-out;}/*!sc*/ data-styled.g275[id="sc-dd041119-11"]{content:"librYF,"}/*!sc*/ .kMlQXP{width:2.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;margin-top:1.2rem;}/*!sc*/ .kMlQXP::before,.kMlQXP::after{content:'';position:absolute;width:2.2rem;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;}/*!sc*/ .kMlQXP::before{-webkit-transform:translateY(-0.7rem);-ms-transform:translateY(-0.7rem);transform:translateY(-0.7rem);}/*!sc*/ .kMlQXP::after{-webkit-transform:translateY(0.7rem);-ms-transform:translateY(0.7rem);transform:translateY(0.7rem);}/*!sc*/ data-styled.g276[id="sc-dd041119-12"]{content:"kMlQXP,"}/*!sc*/ .hxYec{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0;list-style:none;margin:0;line-height:2.4rem;}/*!sc*/ data-styled.g277[id="sc-dd041119-13"]{content:"hxYec,"}/*!sc*/ .ZBdFw{color:#191919;cursor:initial;padding-top:0.9rem;width:104.4rem;position:absolute;left:0;right:0;margin:-0.1rem auto 0;top:6.4rem;display:inline-block;visibility:hidden;opacity:0;-webkit-transform:translateX(-1.6rem);-ms-transform:translateX(-1.6rem);transform:translateX(-1.6rem);-webkit-transition:visibility 0s,opacity 0.2s linear,-webkit-transform 0.2s linear;-webkit-transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;}/*!sc*/ data-styled.g278[id="sc-dd041119-14"]{content:"ZBdFw,"}/*!sc*/ .fIvfJ{position:relative;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .fIvfJ::after{content:'';-webkit-transition:border-color 0.2s ease,-webkit-transform 0.2s ease;-webkit-transition:border-color 0.2s ease,transform 0.2s ease;transition:border-color 0.2s ease,transform 0.2s ease;width:100%;height:0.2rem;border-bottom:0.2rem solid transparent;display:block;bottom:-1.6rem;position:absolute;left:0;-webkit-transform:scale(0,1);-ms-transform:scale(0,1);transform:scale(0,1);}/*!sc*/ data-styled.g279[id="sc-dd041119-15"]{content:"fIvfJ,"}/*!sc*/ .ifXtPt{font-family:Aeonik,sans-serif;padding:1.6rem 1.8rem;cursor:pointer;font-size:1.6rem;font-weight:500;line-height:3.2rem;-webkit-letter-spacing:0.02rem;-moz-letter-spacing:0.02rem;-ms-letter-spacing:0.02rem;letter-spacing:0.02rem;}/*!sc*/ .ifXtPt .sc-dd041119-15 > svg{stroke:#191919;-webkit-transition:stroke 0.2s ease;transition:stroke 0.2s ease;padding-left:0.4rem;}/*!sc*/ .ifXtPt:hover{color:#3F59E4;}/*!sc*/ .ifXtPt:hover .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .ifXtPt:hover .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .ifXtPt:hover .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .ifXtPt:hover .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .ifXtPt:focus-visible{color:#3F59E4;}/*!sc*/ .ifXtPt:focus-visible .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .ifXtPt:focus-visible .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .ifXtPt:focus-visible .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .ifXtPt:focus-visible .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .ifXtPt:focus-within{color:#3F59E4;}/*!sc*/ .ifXtPt:focus-within .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .ifXtPt:focus-within .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .ifXtPt:focus-within .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .ifXtPt:focus-within .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ data-styled.g280[id="sc-dd041119-16"]{content:"ifXtPt,"}/*!sc*/ .ecCLmy{background:rgba(255,255,255,0.88);-webkit-backdrop-filter:blur(20px);backdrop-filter:blur(20px);border:0.1rem solid #C5C5C5;border-radius:1rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g281[id="sc-dd041119-17"]{content:"ecCLmy,"}/*!sc*/ .fpHhIS{min-width:31.1rem;width:31.1rem;padding:3.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ data-styled.g286[id="sc-8f844919-0"]{content:"fpHhIS,"}/*!sc*/ .vgaOL{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .elvwLW{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g287[id="sc-8f844919-1"]{content:"vgaOL,elvwLW,"}/*!sc*/ .juzMWM{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .hkOlGh{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g288[id="sc-8f844919-2"]{content:"juzMWM,hkOlGh,"}/*!sc*/ .cmuXnw{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem;width:100%;min-width:33%;}/*!sc*/ .edUBug{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem 0;}/*!sc*/ .ftjeVJ{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:0;width:100%;min-width:33%;}/*!sc*/ data-styled.g289[id="sc-8f844919-3"]{content:"cmuXnw,edUBug,ftjeVJ,"}/*!sc*/ .kPRjAI{list-style:none;padding:0;height:100%;}/*!sc*/ data-styled.g291[id="sc-c4163730-1"]{content:"kPRjAI,"}/*!sc*/ .jfwYlN{margin:0;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-family:Aeonik,sans-serif;font-weight:500;font-size:1.4rem;line-height:2.4rem;color:#1E212A;}/*!sc*/ .jfwYlN + li{margin-top:1.6rem;}/*!sc*/ .jfwYlN svg{margin-right:1.4rem;min-width:2.4rem;}/*!sc*/ .jfwYlN a{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;width:100%;}/*!sc*/ .jfwYlN a:hover{color:#3F59E4;}/*!sc*/ .jfwYlN:last-of-type{margin-bottom:3.2rem;}/*!sc*/ data-styled.g292[id="sc-c4163730-2"]{content:"jfwYlN,"}/*!sc*/ .eXTZJw{border-top:0.1rem solid #C5C5C5;padding-top:2.4rem;}/*!sc*/ data-styled.g294[id="sc-c4163730-4"]{content:"eXTZJw,"}/*!sc*/ .eqdKOL{list-style:none;padding:0;display:grid;grid-template-columns:1fr;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;height:100%;}/*!sc*/ data-styled.g295[id="sc-31a2510-0"]{content:"eqdKOL,"}/*!sc*/ .AyFjn{margin:0;padding:3.2rem;height:14.47rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .AyFjn + li{border-top:0.1rem solid #C5C5C5;}/*!sc*/ .AyFjn div{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .AyFjn a{color:#5a5f66;width:100%;}/*!sc*/ .AyFjn a svg{margin-right:1.4rem;}/*!sc*/ .AyFjn a p{margin:0;}/*!sc*/ .AyFjn a p:first-child{font-weight:500;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;}/*!sc*/ .AyFjn a:hover p{color:#5a5f66;}/*!sc*/ .AyFjn a:hover p:first-child{color:#3F59E4;}/*!sc*/ data-styled.g296[id="sc-31a2510-1"]{content:"AyFjn,"}/*!sc*/ .kqrdVl a{display:block;color:#1E212A;}/*!sc*/ .kqrdVl a:hover{color:#3F59E4;}/*!sc*/ .kqrdVl a span{font-weight:500;}/*!sc*/ .kqrdVl a + a{margin-top:2.4rem;}/*!sc*/ .kqrdVl a + p{margin-top:3.6rem;}/*!sc*/ data-styled.g297[id="sc-8583e179-0"]{content:"kqrdVl,"}/*!sc*/ .ihoJjn{padding:0 3.2rem;display:block;}/*!sc*/ .ihoJjn:hover p:last-of-type{color:#3F59E4;}/*!sc*/ .ihoJjn:first-child{margin-bottom:2.4rem;}/*!sc*/ data-styled.g301[id="sc-1e1df8de-0"]{content:"ihoJjn,"}/*!sc*/ .jDuOPS{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g302[id="sc-1e1df8de-1"]{content:"jDuOPS,"}/*!sc*/ .iiLmVo{border-radius:0.8rem;width:100%;max-width:13rem;height:9rem;margin-right:1.9rem;object-fit:cover;}/*!sc*/ data-styled.g304[id="sc-1e1df8de-3"]{content:"iiLmVo,"}/*!sc*/ .fBHclw{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g305[id="sc-4b4277c0-0"]{content:"fBHclw,"}/*!sc*/ .cRKzFM{padding:3.2rem 3.2rem 0 3.2rem;}/*!sc*/ data-styled.g306[id="sc-4b4277c0-1"]{content:"cRKzFM,"}/*!sc*/ .fvscCL{background:#fff;padding-top:1.2rem;}/*!sc*/ data-styled.g307[id="sc-da5983f0-0"]{content:"fvscCL,"}/*!sc*/ .ezfOZF{width:100%;max-width:144rem;margin:auto;font-family:Inter,sans-serif;padding:0 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.ezfOZF{padding:0 6.4rem;}}/*!sc*/ data-styled.g308[id="sc-da5983f0-1"]{content:"ezfOZF,"}/*!sc*/ .fKRHFw{display:grid;grid-template-columns:1fr 1fr;grid-row-gap:4.8rem;margin:4.8rem auto auto;}/*!sc*/ @media screen and (min-width:900px){.fKRHFw{margin:6.4rem auto auto;}}/*!sc*/ @media screen and (min-width:1200px){.fKRHFw{grid-template-columns:1fr 1fr 1fr 1fr;grid-template-rows:1fr 1fr;margin:8rem auto auto;max-width:131.2rem;}}/*!sc*/ data-styled.g309[id="sc-da5983f0-2"]{content:"fKRHFw,"}/*!sc*/ .ZAOkc{list-style:none;margin-bottom:0;padding-left:0;}/*!sc*/ data-styled.g310[id="sc-da5983f0-3"]{content:"ZAOkc,"}/*!sc*/ .cXUMOl{font-weight:500;font-size:1.4rem;line-height:3.2rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;padding-right:3.2rem;}/*!sc*/ .cXUMOl a{color:#1e212a;}/*!sc*/ .cXUMOl a span{background:linear-gradient( 59deg, #4016a0 -18.49%, #3f59e4 38.74%, #4cb7a3 106.36% );padding:0.1rem 0.6rem;border-radius:0.4rem;margin-left:0.8rem;color:#fff;font-weight:600;}/*!sc*/ .cXUMOl a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.cXUMOl p::before{content:'';margin-right:0.8rem;border-left:0.1rem solid #8c929c;height:1.2rem;display:inline-block;}}/*!sc*/ data-styled.g312[id="sc-da5983f0-5"]{content:"cXUMOl,"}/*!sc*/ .dsTXTr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ .dsTXTr > ul{-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g313[id="sc-da5983f0-6"]{content:"dsTXTr,"}/*!sc*/ .bkTsFr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;display:none;}/*!sc*/ @media screen and (min-width:900px){.bkTsFr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin-left:0;}}/*!sc*/ .gtvNxS{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;}/*!sc*/ @media screen and (min-width:900px){.gtvNxS{display:none;}}/*!sc*/ data-styled.g314[id="sc-da5983f0-7"]{content:"bkTsFr,gtvNxS,"}/*!sc*/ .kuTTBJ{height:2.4rem;}/*!sc*/ .kuTTBJ:hover{cursor:pointer;}/*!sc*/ .kuTTBJ:hover path{fill:#635dff;}/*!sc*/ data-styled.g315[id="sc-da5983f0-8"]{content:"kuTTBJ,"}/*!sc*/ .dFYjGw{padding:2.4rem 0 0;position:relative;margin-top:4.8rem;}/*!sc*/ @media screen and (min-width:900px){.dFYjGw{display:none;}}/*!sc*/ data-styled.g316[id="sc-da5983f0-9"]{content:"dFYjGw,"}/*!sc*/ .dceiQn{display:none;}/*!sc*/ @media screen and (min-width:900px){.dceiQn{display:block;border-top:0.1rem solid #bdc4cf;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;padding:2.4rem 0;position:relative;margin-top:4.8rem;}}/*!sc*/ @media screen and (min-width:1200px){.dceiQn{margin-top:10rem;}}/*!sc*/ data-styled.g317[id="sc-da5983f0-10"]{content:"dceiQn,"}/*!sc*/ .bfQQBn{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin:2.4rem 1.6rem;}/*!sc*/ data-styled.g318[id="sc-da5983f0-11"]{content:"bfQQBn,"}/*!sc*/ .fMOddY{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-weight:500;color:#8c929c;grid-gap:0.6rem;font-size:1.2rem;line-height:1.8rem;-webkit-flex:1;-ms-flex:1;flex:1;-webkit-flex-flow:wrap;-ms-flex-flow:wrap;flex-flow:wrap;}/*!sc*/ .fMOddY img{max-width:4rem;}/*!sc*/ .fMOddY a{color:#8c929c;}/*!sc*/ .fMOddY a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.fMOddY{-webkit-box-pack:end;-webkit-justify-content:flex-end;-ms-flex-pack:end;justify-content:flex-end;}}/*!sc*/ @media screen and (min-width:1200px){.fMOddY{font-size:1.4rem;line-height:2.2rem;}}/*!sc*/ data-styled.g319[id="sc-da5983f0-12"]{content:"fMOddY,"}/*!sc*/ .kwdIoB{cursor:pointer;height:100%;color:#1e212a;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .kwdIoB svg{stroke:#1e212a;}/*!sc*/ .kwdIoB:hover{color:#635dff;}/*!sc*/ .kwdIoB:hover svg{stroke:#635dff;}/*!sc*/ data-styled.g320[id="sc-da5983f0-13"]{content:"kwdIoB,"}/*!sc*/ .doMXBO{visibility:hidden;opacity:0;position:absolute;-webkit-transition:opacity 0.2s ease;transition:opacity 0.2s ease;left:-3.4rem;top:-20.2rem;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.doMXBO{left:-2.4rem;}}/*!sc*/ data-styled.g321[id="sc-da5983f0-14"]{content:"doMXBO,"}/*!sc*/ .eZHkDb{min-width:13.4rem;margin-top:0;background:#fff;color:#635dff;box-shadow:0 0 0.8rem rgba(0,0,0,0.25);border-radius:0.8rem;padding:1.6rem 2.4rem;list-style:none;}/*!sc*/ data-styled.g322[id="sc-da5983f0-15"]{content:"eZHkDb,"}/*!sc*/ .hYxKnm{line-height:2.8rem;}/*!sc*/ .hYxKnm:hover{color:#635dff;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g323[id="sc-da5983f0-16"]{content:"hYxKnm,"}/*!sc*/ .fWXPij{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;z-index:1;font-size:1.2rem;}/*!sc*/ @media screen and (min-width:1200px){.fWXPij{font-size:1.4rem;}}/*!sc*/ .fWXPij:hover .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fWXPij:focus-visible .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fWXPij:focus-within .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ data-styled.g324[id="sc-da5983f0-17"]{content:"fWXPij,"}/*!sc*/ .iBuHa-D{margin-left:0.8rem;font-weight:500;}/*!sc*/ data-styled.g325[id="sc-da5983f0-18"]{content:"iBuHa-D,"}/*!sc*/ .hdUzyc{padding:4rem 0;display:block;text-align:center;background-color:#f1f3f7;}/*!sc*/ @media screen and (min-width:900px){.hdUzyc{text-align:left;padding:6rem 0;}}/*!sc*/ @media screen and (min-width:1200px){.hdUzyc{padding:8rem 2rem;}}/*!sc*/ data-styled.g329[id="sc-3e4086c7-0"]{content:"hdUzyc,"}/*!sc*/ .fEObSb{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0 2rem;margin:0 auto;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:1200px){.fEObSb{max-width:121.6rem;padding:0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:3.2rem;}}/*!sc*/ data-styled.g330[id="sc-3e4086c7-1"]{content:"fEObSb,"}/*!sc*/ .eBkOFK{color:#1e212a;font-family:SpaceGrotesk,sans-serif;font-size:2.8rem;line-height:3.6rem;-webkit-letter-spacing:-0.0375rem;-moz-letter-spacing:-0.0375rem;-ms-letter-spacing:-0.0375rem;letter-spacing:-0.0375rem;font-weight:600;padding:0;margin:0 auto 3.2rem;display:block;text-align:center;}/*!sc*/ .eBkOFK p{margin:0;}/*!sc*/ @media screen and (min-width:900px){.eBkOFK{font-size:3.2rem;line-height:4rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;}}/*!sc*/ @media screen and (min-width:1200px){.eBkOFK{margin:0;max-width:100%;font-size:4.2rem;line-height:5.2rem;-webkit-letter-spacing:-0.1rem;-moz-letter-spacing:-0.1rem;-ms-letter-spacing:-0.1rem;letter-spacing:-0.1rem;text-align:left;}}/*!sc*/ data-styled.g331[id="sc-3e4086c7-2"]{content:"eBkOFK,"}/*!sc*/ .ggNbtU{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;width:100%;}/*!sc*/ @media screen and (min-width:1200px){.ggNbtU{-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;width:auto;}}/*!sc*/ data-styled.g332[id="sc-3e4086c7-3"]{content:"ggNbtU,"}/*!sc*/ .hwtIDu{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:#635DFF;}/*!sc*/ .hwtIDu:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ .hwtIDu:hover{color:#ffffff;background-color:#564ed1;}/*!sc*/ @media screen and (min-width:1200px){.hwtIDu{margin:0 0 0 3.2rem;font-size:1.4rem;}.hwtIDu:not(:last-child){margin:0;}}/*!sc*/ .cNWeht{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:transparent;color:#1E212A;border:0.15rem solid #606060;}/*!sc*/ .cNWeht:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ @media screen and (min-width:1200px){.cNWeht{margin:0 0 0 3.2rem;font-size:1.4rem;}.cNWeht:not(:last-child){margin:0;}}/*!sc*/ data-styled.g333[id="sc-3e4086c7-4"]{content:"hwtIDu,cNWeht,"}/*!sc*/ .cxBAMi{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ data-styled.g334[id="sc-59b87673-0"]{content:"cxBAMi,"}/*!sc*/ .jYbkpB{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;height:3.4rem;background-color:#fff;border:0.1rem solid #ced2d4;border-radius:0.3rem;overflow-x:scroll;padding-inline-start:0;margin-block-start:0;margin-block-end:0;}/*!sc*/ @media screen and (min-width:900px){.jYbkpB{overflow-x:unset;}}/*!sc*/ data-styled.g335[id="sc-59b87673-1"]{content:"jYbkpB,"}/*!sc*/ .kELnws{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;width:4.3rem;border:0 solid #ced2d4;font-size:1.6rem;line-height:2.8rem;color:#333;-webkit-transition:background-color 0.2s ease 0s;transition:background-color 0.2s ease 0s;background-color:#e8e8e8 !important;border-width:0 0.1rem;}/*!sc*/ .kELnws:hover{cursor:pointer;background-color:#e8e8e885;}/*!sc*/ .kELnws:first-child{border-left-width:0;}/*!sc*/ .kELnws:last-child{border-right-width:0;}/*!sc*/ .ldfsQT{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;width:4.3rem;border:0 solid #ced2d4;font-size:1.6rem;line-height:2.8rem;color:#333;-webkit-transition:background-color 0.2s ease 0s;transition:background-color 0.2s ease 0s;}/*!sc*/ .ldfsQT:hover{cursor:pointer;background-color:#e8e8e885;}/*!sc*/ .ldfsQT:first-child{border-left-width:0;}/*!sc*/ .ldfsQT:last-child{border-right-width:0;}/*!sc*/ data-styled.g336[id="sc-59b87673-2"]{content:"kELnws,ldfsQT,"}/*!sc*/ .goMtfQ{text-align:center;max-width:121.6rem;margin:0 auto 12rem;padding-top:0;}/*!sc*/ @media screen and (min-width:1200px){.goMtfQ{padding-top:10.7rem;}}/*!sc*/ data-styled.g337[id="sc-527f19d-0"]{content:"goMtfQ,"}/*!sc*/ .lhJrRr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;margin:4rem 2rem;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;gap:4rem;}/*!sc*/ @media screen and (min-width:900px){.lhJrRr{margin:8rem 2rem;}}/*!sc*/ @media screen and (min-width:1200px){.lhJrRr{margin:8rem 0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:0;}}/*!sc*/ data-styled.g338[id="sc-527f19d-1"]{content:"lhJrRr,"}/*!sc*/ .fpOVHv{display:grid;grid-template-columns:repeat(auto-fill,28rem);grid-column-gap:3.2rem;grid-row-gap:4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 4rem;}/*!sc*/ @media screen and (min-width:900px){.fpOVHv{grid-row-gap:6.4rem;margin:0 0 6rem;}}/*!sc*/ data-styled.g340[id="sc-527f19d-3"]{content:"fpOVHv,"}/*!sc*/ .bSdvZL{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 6.4rem;-webkit-flex-direction:column-reverse;-ms-flex-direction:column-reverse;flex-direction:column-reverse;row-gap:4.2rem;}/*!sc*/ @media screen and (min-width:900px){.bSdvZL{-webkit-align-items:baseline;-webkit-box-align:baseline;-ms-flex-align:baseline;align-items:baseline;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ @media screen and (min-width:1200px){.bSdvZL{margin:0 0 6rem;border-bottom:0.5px solid #BDC4CF;margin:0 0 6.4rem;}}/*!sc*/ data-styled.g341[id="sc-527f19d-4"]{content:"bSdvZL,"}/*!sc*/ .fcFyPA{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;gap:3.4rem;}/*!sc*/ data-styled.g342[id="sc-527f19d-5"]{content:"fcFyPA,"}/*!sc*/ .OrXVW{max-width:28rem;text-align:left;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;position:relative;}/*!sc*/ data-styled.g343[id="sc-527f19d-6"]{content:"OrXVW,"}/*!sc*/ .eEWXUq{width:2.4rem;position:absolute;left:1.5rem;}/*!sc*/ data-styled.g344[id="sc-527f19d-7"]{content:"eEWXUq,"}/*!sc*/ .cHZRhB{border:0.1rem solid #8c929c;border-radius:0.8rem;width:100%;font-weight:400;font-size:1.4rem;line-height:2.4rem;font-family:Inter,sans-serif;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;height:4rem;padding:0.8rem 0 0.8rem 5rem;}/*!sc*/ .cHZRhB::-webkit-input-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB::-moz-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB:-ms-input-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB::placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB:focus{outline:none !important;border:0.2rem solid #93c7dd;}/*!sc*/ @media screen and (min-width:900px){.cHZRhB{padding:0.8rem 0 0.8rem 5rem;}}/*!sc*/ data-styled.g345[id="sc-527f19d-8"]{content:"cHZRhB,"}/*!sc*/ .fGcUkc{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g346[id="sc-527f19d-9"]{content:"fGcUkc,"}/*!sc*/ .jgLKGs{background:url(https://cdn.auth0.com/website/resources/select-arrow.svg) 1.4rem no-repeat;background-position:100%;border:none;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;color:#42464d;padding:0 2.4rem 0 1rem;position:relative;margin:0;text-transform:capitalize;font-size:1.4rem;line-height:2.2rem;font-weight:500;font-family:Inter,sans-serif;cursor:pointer;-webkit-appearance:none;-moz-appearance:none;appearance:none;outline:none;}/*!sc*/ data-styled.g347[id="sc-527f19d-10"]{content:"jgLKGs,"}/*!sc*/ .bIlYES{max-width:15rem;border-radius:0.3rem;-webkit-transition:all 0.6s ease;transition:all 0.6s ease;will-change:transform;}/*!sc*/ data-styled.g348[id="sc-527f19d-11"]{content:"bIlYES,"}/*!sc*/ .gmktfe{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;text-align:left;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;will-change:transform;cursor:pointer;}/*!sc*/ .gmktfe:hover{-webkit-transform:scale(1.02);-ms-transform:scale(1.02);transform:scale(1.02);}/*!sc*/ .gmktfe:hover .sc-527f19d-11{-webkit-transform:scale(1.1);-ms-transform:scale(1.1);transform:scale(1.1);}/*!sc*/ data-styled.g349[id="sc-527f19d-12"]{content:"gmktfe,"}/*!sc*/ .laBlzA{height:18.6rem;overflow:hidden;background:linear-gradient(0deg,#bdc4cf,#dadfe8);border-radius:0.8rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;padding-top:2rem;}/*!sc*/ data-styled.g350[id="sc-527f19d-13"]{content:"laBlzA,"}/*!sc*/ .kkgLIr{font-size:2rem;line-height:3.2rem;font-weight:500;font-family:Inter,sans-serif;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#333333;margin:0;}/*!sc*/ data-styled.g351[id="sc-527f19d-14"]{content:"kkgLIr,"}/*!sc*/ .lfPVOF{font-size:1.3rem;line-height:2.3rem;font-family:SpaceGrotesk,sans-serif;font-feature-settings:'pnum' on,'lnum' on,'ordn' on,'ss03' on,'ss04' on, 'kern' off;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;text-transform:uppercase;color:#727272;margin:1rem 0 0.8rem 0;}/*!sc*/ @media screen and (min-width:900px){.lfPVOF{margin:2rem 0 0.8rem 0;}}/*!sc*/ data-styled.g352[id="sc-527f19d-15"]{content:"lfPVOF,"}/*!sc*/ .fIEFZB{list-style:none;line-height:unset;padding:0;margin:0 0 2.4rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:3.3rem;border-bottom:0.05rem solid #bdc4cf;overflow-x:scroll;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.fIEFZB{margin:0;border-bottom:none;overflow-x:unset;}}/*!sc*/ data-styled.g354[id="sc-527f19d-17"]{content:"fIEFZB,"}/*!sc*/ .iEGZFq{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:0.2rem solid #1E212A;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .iEGZFq a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.iEGZFq{padding-bottom:2.4rem;}}/*!sc*/ .fkPsWQ{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:none;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .fkPsWQ a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.fkPsWQ{padding-bottom:2.4rem;}}/*!sc*/ data-styled.g355[id="sc-527f19d-18"]{content:"iEGZFq,fkPsWQ,"}/*!sc*/ </style></head><body><div id="__next"><div class="sc-dd041119-2 iaTkkA"></div><div class="sc-dd041119-1 eiqtQu"></div><header class="sc-dd041119-3 dAIDFK"><div class="sc-5beafa8a-0 itTgje"><div class="sc-5beafa8a-1 fXlPNE"><a class="sc-5beafa8a-5 gnbkUy"></a><div class="sc-5beafa8a-6 fGOvxz"><a href="/api/auth/login?redirectTo=dashboard" rel="external" class="sc-5beafa8a-7 gCDOIN">Login</a><div class="sc-5beafa8a-8 bgMNvC"><div class="sc-5beafa8a-10 flgNuK"><span class="sc-5beafa8a-12 gUmNqK"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg></span><select aria-label="Language selector" class="sc-5beafa8a-11 jjbnIz"><option value="de" class="sc-5beafa8a-9 iDaiez">Deutsch</option><option value="en" class="sc-5beafa8a-9 iDaiez" selected="">English</option><option value="fr" class="sc-5beafa8a-9 iDaiez">Français</option><option value="es" class="sc-5beafa8a-9 iDaiez">Español</option><option value="pt" class="sc-5beafa8a-9 iDaiez">Português</option><option value="ja" class="sc-5beafa8a-9 iDaiez">日本語</option></select><span class="sc-5beafa8a-13 cJXqJO"><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></span></div></div></div></div></div><nav aria-label="Mobile nav" class="sc-dd041119-9 irBpqS"><a rel="external" href="/" aria-label="Auth0 logo" class="sc-dd041119-5 iDvPUZ"><svg xmlns="http://www.w3.org/2000/svg" width="106" height="40" viewBox="0 0 106 40" fill="none"><path d="M1.69096 17.4795C6.93608 16.6184 11.0487 12.5058 11.9098 7.26068L12.3326 4.70858C12.4108 4.21277 12.009 3.77959 11.5079 3.81612C7.51539 4.12404 3.75249 5.44967 1.67009 6.30037C0.662823 6.71268 0 7.69386 0 8.78985V16.8532C0 17.3282 0.422753 17.6883 0.892465 17.61L1.69096 17.4795Z" fill="#191919"></path><path d="M14.4356 7.26056C15.2968 12.5057 19.4094 16.6183 24.6545 17.4794L25.453 17.6099C25.9227 17.6882 26.3454 17.3281 26.3454 16.8531V8.78973C26.3454 7.69895 25.6826 6.71777 24.6753 6.30025C22.5982 5.44433 18.83 4.12392 14.8375 3.816C14.3365 3.77947 13.9294 4.21265 14.0129 4.70846L14.4356 7.26056Z" fill="#191919"></path><path d="M24.6589 20.0112C19.4138 20.8723 15.3012 24.9849 14.44 30.23L13.9181 35.209C13.8712 35.6578 14.367 35.9762 14.7428 35.7257C14.7428 35.7257 14.748 35.7257 14.7532 35.7205C18.0412 33.5024 25.5461 27.6936 26.2872 20.4392C26.3238 20.0843 26.0054 19.792 25.6557 19.8494L24.6641 20.0112H24.6589Z" fill="#191919"></path><path d="M11.9075 30.2277C11.0464 24.9826 6.9338 20.87 1.68868 20.0088L0.618783 19.8314C0.305641 19.7792 0.0238052 20.0401 0.0551193 20.3585C0.759688 27.6547 8.36904 33.5 11.6831 35.7181C12.0276 35.9477 12.4816 35.6711 12.4399 35.2588L11.9128 30.2225L11.9075 30.2277Z" fill="#191919"></path><path d="M62.7942 13.954H60.297C60.1456 13.954 60.0267 14.073 60.0267 14.2243V21.4295C60.0267 22.3105 59.8807 23.0835 59.5889 23.7483C59.297 24.4132 58.8862 24.9213 58.3511 25.2672C57.8159 25.6132 57.1835 25.7861 56.4538 25.7861C55.4052 25.7861 54.616 25.4402 54.0917 24.7483C53.5674 24.0564 53.3026 23.0619 53.3026 21.77V14.2243C53.3026 14.073 53.1837 13.954 53.0323 13.954H50.5081C50.3567 13.954 50.2378 14.073 50.2378 14.2243V22.0781C50.2378 23.2943 50.3891 24.3105 50.6864 25.1267C50.9837 25.9429 51.3945 26.6023 51.908 27.1104C52.4215 27.6185 53.0107 27.9752 53.6809 28.1915C54.3458 28.4077 55.0431 28.5158 55.7728 28.5158C56.8214 28.5158 57.6916 28.3158 58.3889 27.9104C58.9024 27.6131 59.3348 27.2834 59.697 26.9158C59.8483 26.7591 60.1078 26.8455 60.151 27.0564L60.3456 28.1212C60.3672 28.2509 60.4807 28.3428 60.6105 28.3428H62.7834C62.9347 28.3428 63.0536 28.2239 63.0536 28.0725V14.2243C63.0536 14.073 62.9347 13.954 62.7834 13.954H62.7942Z" fill="#191919"></path><path d="M73.644 25.6751H70.3846C69.8062 25.6751 69.3954 25.5562 69.163 25.3237C68.9306 25.0913 68.8117 24.6913 68.8117 24.1292V16.897C68.8117 16.7456 68.9306 16.6267 69.0819 16.6267H73.5034C73.6548 16.6267 73.7737 16.5078 73.7737 16.3564V14.2268C73.7737 14.0754 73.6548 13.9565 73.5034 13.9565H69.3522C69.0549 13.9565 68.8117 13.7133 68.8117 13.416V9.85394C68.8117 9.70259 68.6928 9.58368 68.5414 9.58368H66.0442C65.8928 9.58368 65.7739 9.70259 65.7739 9.85394V24.4427C65.7739 25.7562 66.082 26.7345 66.7036 27.3777C67.3198 28.0264 68.3144 28.3453 69.6819 28.3453H73.644C73.7953 28.3453 73.9142 28.2264 73.9142 28.075V25.9453C73.9142 25.794 73.7953 25.6751 73.644 25.6751Z" fill="#191919"></path><path d="M86.3392 14.5169C85.4852 14.0304 84.4907 13.7872 83.3447 13.7872C82.4475 13.7872 81.6205 13.9655 80.8691 14.3223C80.3286 14.5817 79.8475 14.9006 79.4367 15.2844C79.2638 15.4466 78.9881 15.3223 78.9881 15.0898V8.93866C78.9881 8.78731 78.8692 8.6684 78.7178 8.6684H76.1936C76.0423 8.6684 75.9233 8.78731 75.9233 8.93866V28.0732C75.9233 28.2246 76.0423 28.3435 76.1936 28.3435H78.7178C78.8692 28.3435 78.9881 28.2246 78.9881 28.0732V21.0626C78.9881 20.1275 79.1395 19.3167 79.4367 18.6303C79.734 17.9492 80.1611 17.4195 80.7178 17.0411C81.2691 16.6682 81.9232 16.479 82.6691 16.479C83.415 16.479 84.0096 16.6465 84.4961 16.9871C84.9825 17.3222 85.3501 17.7979 85.5933 18.4086C85.8366 19.0194 85.9609 19.7437 85.9609 20.587V28.0732C85.9609 28.2246 86.0798 28.3435 86.2311 28.3435H88.7284C88.8797 28.3435 88.9986 28.2246 88.9986 28.0732V20.3329C88.9986 18.8735 88.7716 17.6573 88.3122 16.6952C87.8527 15.7276 87.1987 15.0033 86.3446 14.5169H86.3392Z" fill="#191919"></path><path d="M104.469 12.9455C103.891 11.5239 103.064 10.4267 101.994 9.65913C100.923 8.89158 99.6423 8.50781 98.1451 8.50781C96.6478 8.50781 95.3884 8.89158 94.3073 9.65913C93.2317 10.4267 92.3993 11.5239 91.8209 12.9455C91.2426 14.3725 90.9507 16.0752 90.9507 18.0589V18.9561C90.9507 20.9615 91.2426 22.6804 91.8209 24.1128C92.3993 25.5451 93.2317 26.637 94.3073 27.3883C95.383 28.1397 96.664 28.5126 98.1451 28.5126C99.6261 28.5126 100.929 28.1397 101.994 27.3883C103.058 26.637 103.885 25.5451 104.469 24.1128C105.048 22.6804 105.339 20.9615 105.339 18.9561V18.0589C105.339 16.0752 105.048 14.3671 104.469 12.9455ZM94.0155 19.3021C94.0155 19.1507 94.0155 18.9994 94.0155 18.848V18.1724C94.0155 15.886 94.3722 14.1347 95.0857 12.9185C95.7992 11.7023 96.8208 11.0915 98.1505 11.0915C99.3883 11.0915 100.356 11.6158 101.058 12.6699C101.329 13.0482 101.096 13.5293 100.983 13.659L95.4424 19.8372C94.9506 20.3885 94.0425 20.048 94.0263 19.3129L94.0155 19.3021ZM102.275 18.848C102.275 21.1182 101.918 22.8587 101.204 24.0749C100.491 25.2911 99.4693 25.9019 98.1397 25.9019C96.9181 25.9019 95.9559 25.3884 95.2587 24.3614C94.9884 23.9884 95.2208 23.5128 95.3343 23.3776L100.853 17.1886C101.345 16.6373 102.253 16.9724 102.269 17.7129C102.269 17.8643 102.269 18.021 102.269 18.1778V18.8534L102.275 18.848Z" fill="#191919"></path><path d="M48.5034 25.7039H48.4277C48.125 25.7039 47.9142 25.6391 47.7791 25.5093C47.6493 25.3796 47.5845 25.1364 47.5845 24.7796V19.0176C47.5845 17.315 47.0602 16.0177 46.0115 15.1259C44.9629 14.234 43.4927 13.7908 41.6009 13.7908C40.4009 13.7908 39.3469 13.98 38.4388 14.3529C37.5307 14.7259 36.8064 15.2556 36.2605 15.9421C35.7794 16.5474 35.4767 17.2447 35.347 18.0339C35.32 18.196 35.4551 18.3474 35.6173 18.3474H38.0712C38.1956 18.3474 38.2983 18.2609 38.3307 18.1366C38.4766 17.5961 38.7955 17.1528 39.2982 16.8123C39.8604 16.4285 40.5793 16.2339 41.4603 16.2339C42.4333 16.2339 43.1954 16.461 43.7359 16.9204C44.2765 17.3799 44.5521 18.0123 44.5521 18.8176V19.4176C44.5521 19.569 44.4332 19.6879 44.2819 19.6879H41.0117C39.028 19.6879 37.5145 20.0879 36.4713 20.8825C35.4335 21.677 34.9092 22.8175 34.9092 24.2986C34.9092 25.1796 35.1362 25.9364 35.5848 26.5742C36.0335 27.212 36.6551 27.6931 37.455 28.0228C38.2496 28.3525 39.1631 28.5147 40.1955 28.5147C41.5468 28.5147 42.6441 28.2012 43.4981 27.5741C43.8711 27.2985 44.2062 26.985 44.4981 26.6444C44.6386 26.4769 44.9143 26.5363 44.9629 26.7471C45.0386 27.1039 45.1845 27.4174 45.3954 27.6714C45.7683 28.1201 46.4656 28.3471 47.4764 28.3471H48.779C48.9304 28.3471 49.0493 28.2282 49.0493 28.0768V26.1526C49.0493 25.785 48.9304 25.7039 48.5088 25.7039H48.5034ZM44.5467 22.5311C44.5467 23.2229 44.39 23.8499 44.0711 24.4013C43.7522 24.9526 43.3035 25.385 42.7198 25.6931C42.1414 26.0012 41.4333 26.158 40.6117 26.158C39.7901 26.158 39.1631 25.9634 38.6874 25.5796C38.2118 25.1958 37.9685 24.704 37.9685 24.104C37.9685 23.3743 38.2172 22.8283 38.7145 22.4716C39.2118 22.1148 39.9252 21.9365 40.8658 21.9365H44.5467V22.5256V22.5311Z" fill="#191919"></path></svg></a><div class="sc-dd041119-10 lmuCEj"><button aria-label="Menu" aria-expanded="false" class="sc-dd041119-11 librYF"><span class="sc-dd041119-12 kMlQXP"></span></button></div><section class="sc-48604b4d-0 fahHZk"><ul class="sc-48604b4d-1 dYTUtR"><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Developers</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Developers</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/" rel="external">Developer Center</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/resources/code-samples" rel="external">Code Samples</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/resources/guides" rel="external">Guides</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" rel="external">Identity Unlocked - Podcasts</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/newsletter" rel="external">Zero Index Newsletter</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Developer Tools</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://openidconnect.net/" rel="external">OIDC Connect Playground</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://samltool.io/" rel="external">SAML Tool</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="http://jwt.io/" rel="external">JWT.io</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="http://webauthn.me/" rel="external">Webauthn.me</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Get Involved</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/events" rel="external">Events</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/research-program" rel="external">Auth0 Research Program</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Documentation</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Documentation</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs" rel="external">Auth0 Docs</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/articles" rel="external">Articles</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/quickstarts" rel="external">Quickstarts</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/api" rel="external">APIs</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/libraries" rel="external">SDK Libraries</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Support Center</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/" rel="external">Community</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://support.auth0.com/" rel="external">Support</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/c/help/6" rel="external">Help</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/c/faq/42" rel="external">FAQs</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://marketplace.auth0.com" rel="external">Explore Auth0 Marketplace</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/resources" rel="external">Resources</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/blog/" rel="external">Blog</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/learn" rel="external">Learn</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/intro-to-iam" rel="external">Intro to IAM (CIAM)</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Product</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Platform</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/platform/access-management" rel="external">Access Management</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/platform/extensibility" rel="external">Extensibility</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/platform/login-security" rel="external">Security</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/platform/user-management" rel="external">User Management</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/platform/authentication" rel="external">Authentication</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/fine-grained-authorization" rel="external">Fine Grained Authorization</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://auth0.com/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fOVXAi cGdNT">View platform</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Features</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/universal-login" rel="external">Universal Login</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/single-sign-on" rel="external">Single Sign On</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/multifactor-authentication" rel="external">Multifactor Authentication</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/actions" rel="external">Actions</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/machine-to-machine" rel="external">Machine to Machine</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/passwordless" rel="external">Passwordless</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/features/breached-passwords" rel="external">Breached Passwords</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://auth0.com/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fOVXAi cGdNT">View features</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Solutions</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Industries</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/nonprofits" rel="external">Nonprofits & Charities</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/startups" rel="external">Startups</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Use Cases</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/b2c-customer-identity-management" rel="external">Consumer Applications</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/b2b-saas" rel="external">B2B SaaS Applications</a></li></ul></div></div></li><li class="sc-48604b4d-2 sc-48604b4d-3 bBPBdn UJeau"><a href="/blog/" rel="external" class="sc-48604b4d-4 dcBPNJ">Blog</a></li><li class="sc-48604b4d-2 sc-48604b4d-3 bBPBdn UJeau"><a href="/pricing/" rel="external" class="sc-48604b4d-4 dcBPNJ">Pricing</a></li><li class="sc-48604b4d-2 sc-48604b4d-3 bBPBdn UJeau"><div class="sc-48604b4d-13 bOieih"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><p class="sc-48604b4d-14 cSezqg">Language</p></div><select class="sc-48604b4d-12 hMidHS"><option value="de">Deutsch</option><option value="en" selected="">English</option><option value="fr">Français</option><option value="es">Español</option><option value="pt">Português</option><option value="ja">日本語</option></select></li></ul><div class="sc-48604b4d-15 kJKosn"><div class="sc-48604b4d-18 hydWjh"><a rel="external" href="/signup?place=header&type=button&text=sign%20up" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cJRWJS dCCmSO"><span>Sign up</span></a><a href="/api/auth/login?redirectTo=dashboard" rel="external" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 gsHAMX dCCmSO"><span>Login</span></a></div><a href="/contact-us?place=header&type=button&text=contact%20sales" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 iBRLYD isBdzo"><span>Contact sales</span></a></div></section></nav><nav aria-label="Desktop nav" class="sc-dd041119-6 cdYdvX"><div class="sc-dd041119-7 SNAUb"><a rel="external" href="/" aria-label="Auth0 logo" class="sc-dd041119-4 hvNmHd"><svg xmlns="http://www.w3.org/2000/svg" width="106" height="40" viewBox="0 0 106 40" fill="none"><path d="M1.69096 17.4795C6.93608 16.6184 11.0487 12.5058 11.9098 7.26068L12.3326 4.70858C12.4108 4.21277 12.009 3.77959 11.5079 3.81612C7.51539 4.12404 3.75249 5.44967 1.67009 6.30037C0.662823 6.71268 0 7.69386 0 8.78985V16.8532C0 17.3282 0.422753 17.6883 0.892465 17.61L1.69096 17.4795Z" fill="#191919"></path><path d="M14.4356 7.26056C15.2968 12.5057 19.4094 16.6183 24.6545 17.4794L25.453 17.6099C25.9227 17.6882 26.3454 17.3281 26.3454 16.8531V8.78973C26.3454 7.69895 25.6826 6.71777 24.6753 6.30025C22.5982 5.44433 18.83 4.12392 14.8375 3.816C14.3365 3.77947 13.9294 4.21265 14.0129 4.70846L14.4356 7.26056Z" fill="#191919"></path><path d="M24.6589 20.0112C19.4138 20.8723 15.3012 24.9849 14.44 30.23L13.9181 35.209C13.8712 35.6578 14.367 35.9762 14.7428 35.7257C14.7428 35.7257 14.748 35.7257 14.7532 35.7205C18.0412 33.5024 25.5461 27.6936 26.2872 20.4392C26.3238 20.0843 26.0054 19.792 25.6557 19.8494L24.6641 20.0112H24.6589Z" fill="#191919"></path><path d="M11.9075 30.2277C11.0464 24.9826 6.9338 20.87 1.68868 20.0088L0.618783 19.8314C0.305641 19.7792 0.0238052 20.0401 0.0551193 20.3585C0.759688 27.6547 8.36904 33.5 11.6831 35.7181C12.0276 35.9477 12.4816 35.6711 12.4399 35.2588L11.9128 30.2225L11.9075 30.2277Z" fill="#191919"></path><path d="M62.7942 13.954H60.297C60.1456 13.954 60.0267 14.073 60.0267 14.2243V21.4295C60.0267 22.3105 59.8807 23.0835 59.5889 23.7483C59.297 24.4132 58.8862 24.9213 58.3511 25.2672C57.8159 25.6132 57.1835 25.7861 56.4538 25.7861C55.4052 25.7861 54.616 25.4402 54.0917 24.7483C53.5674 24.0564 53.3026 23.0619 53.3026 21.77V14.2243C53.3026 14.073 53.1837 13.954 53.0323 13.954H50.5081C50.3567 13.954 50.2378 14.073 50.2378 14.2243V22.0781C50.2378 23.2943 50.3891 24.3105 50.6864 25.1267C50.9837 25.9429 51.3945 26.6023 51.908 27.1104C52.4215 27.6185 53.0107 27.9752 53.6809 28.1915C54.3458 28.4077 55.0431 28.5158 55.7728 28.5158C56.8214 28.5158 57.6916 28.3158 58.3889 27.9104C58.9024 27.6131 59.3348 27.2834 59.697 26.9158C59.8483 26.7591 60.1078 26.8455 60.151 27.0564L60.3456 28.1212C60.3672 28.2509 60.4807 28.3428 60.6105 28.3428H62.7834C62.9347 28.3428 63.0536 28.2239 63.0536 28.0725V14.2243C63.0536 14.073 62.9347 13.954 62.7834 13.954H62.7942Z" fill="#191919"></path><path d="M73.644 25.6751H70.3846C69.8062 25.6751 69.3954 25.5562 69.163 25.3237C68.9306 25.0913 68.8117 24.6913 68.8117 24.1292V16.897C68.8117 16.7456 68.9306 16.6267 69.0819 16.6267H73.5034C73.6548 16.6267 73.7737 16.5078 73.7737 16.3564V14.2268C73.7737 14.0754 73.6548 13.9565 73.5034 13.9565H69.3522C69.0549 13.9565 68.8117 13.7133 68.8117 13.416V9.85394C68.8117 9.70259 68.6928 9.58368 68.5414 9.58368H66.0442C65.8928 9.58368 65.7739 9.70259 65.7739 9.85394V24.4427C65.7739 25.7562 66.082 26.7345 66.7036 27.3777C67.3198 28.0264 68.3144 28.3453 69.6819 28.3453H73.644C73.7953 28.3453 73.9142 28.2264 73.9142 28.075V25.9453C73.9142 25.794 73.7953 25.6751 73.644 25.6751Z" fill="#191919"></path><path d="M86.3392 14.5169C85.4852 14.0304 84.4907 13.7872 83.3447 13.7872C82.4475 13.7872 81.6205 13.9655 80.8691 14.3223C80.3286 14.5817 79.8475 14.9006 79.4367 15.2844C79.2638 15.4466 78.9881 15.3223 78.9881 15.0898V8.93866C78.9881 8.78731 78.8692 8.6684 78.7178 8.6684H76.1936C76.0423 8.6684 75.9233 8.78731 75.9233 8.93866V28.0732C75.9233 28.2246 76.0423 28.3435 76.1936 28.3435H78.7178C78.8692 28.3435 78.9881 28.2246 78.9881 28.0732V21.0626C78.9881 20.1275 79.1395 19.3167 79.4367 18.6303C79.734 17.9492 80.1611 17.4195 80.7178 17.0411C81.2691 16.6682 81.9232 16.479 82.6691 16.479C83.415 16.479 84.0096 16.6465 84.4961 16.9871C84.9825 17.3222 85.3501 17.7979 85.5933 18.4086C85.8366 19.0194 85.9609 19.7437 85.9609 20.587V28.0732C85.9609 28.2246 86.0798 28.3435 86.2311 28.3435H88.7284C88.8797 28.3435 88.9986 28.2246 88.9986 28.0732V20.3329C88.9986 18.8735 88.7716 17.6573 88.3122 16.6952C87.8527 15.7276 87.1987 15.0033 86.3446 14.5169H86.3392Z" fill="#191919"></path><path d="M104.469 12.9455C103.891 11.5239 103.064 10.4267 101.994 9.65913C100.923 8.89158 99.6423 8.50781 98.1451 8.50781C96.6478 8.50781 95.3884 8.89158 94.3073 9.65913C93.2317 10.4267 92.3993 11.5239 91.8209 12.9455C91.2426 14.3725 90.9507 16.0752 90.9507 18.0589V18.9561C90.9507 20.9615 91.2426 22.6804 91.8209 24.1128C92.3993 25.5451 93.2317 26.637 94.3073 27.3883C95.383 28.1397 96.664 28.5126 98.1451 28.5126C99.6261 28.5126 100.929 28.1397 101.994 27.3883C103.058 26.637 103.885 25.5451 104.469 24.1128C105.048 22.6804 105.339 20.9615 105.339 18.9561V18.0589C105.339 16.0752 105.048 14.3671 104.469 12.9455ZM94.0155 19.3021C94.0155 19.1507 94.0155 18.9994 94.0155 18.848V18.1724C94.0155 15.886 94.3722 14.1347 95.0857 12.9185C95.7992 11.7023 96.8208 11.0915 98.1505 11.0915C99.3883 11.0915 100.356 11.6158 101.058 12.6699C101.329 13.0482 101.096 13.5293 100.983 13.659L95.4424 19.8372C94.9506 20.3885 94.0425 20.048 94.0263 19.3129L94.0155 19.3021ZM102.275 18.848C102.275 21.1182 101.918 22.8587 101.204 24.0749C100.491 25.2911 99.4693 25.9019 98.1397 25.9019C96.9181 25.9019 95.9559 25.3884 95.2587 24.3614C94.9884 23.9884 95.2208 23.5128 95.3343 23.3776L100.853 17.1886C101.345 16.6373 102.253 16.9724 102.269 17.7129C102.269 17.8643 102.269 18.021 102.269 18.1778V18.8534L102.275 18.848Z" fill="#191919"></path><path d="M48.5034 25.7039H48.4277C48.125 25.7039 47.9142 25.6391 47.7791 25.5093C47.6493 25.3796 47.5845 25.1364 47.5845 24.7796V19.0176C47.5845 17.315 47.0602 16.0177 46.0115 15.1259C44.9629 14.234 43.4927 13.7908 41.6009 13.7908C40.4009 13.7908 39.3469 13.98 38.4388 14.3529C37.5307 14.7259 36.8064 15.2556 36.2605 15.9421C35.7794 16.5474 35.4767 17.2447 35.347 18.0339C35.32 18.196 35.4551 18.3474 35.6173 18.3474H38.0712C38.1956 18.3474 38.2983 18.2609 38.3307 18.1366C38.4766 17.5961 38.7955 17.1528 39.2982 16.8123C39.8604 16.4285 40.5793 16.2339 41.4603 16.2339C42.4333 16.2339 43.1954 16.461 43.7359 16.9204C44.2765 17.3799 44.5521 18.0123 44.5521 18.8176V19.4176C44.5521 19.569 44.4332 19.6879 44.2819 19.6879H41.0117C39.028 19.6879 37.5145 20.0879 36.4713 20.8825C35.4335 21.677 34.9092 22.8175 34.9092 24.2986C34.9092 25.1796 35.1362 25.9364 35.5848 26.5742C36.0335 27.212 36.6551 27.6931 37.455 28.0228C38.2496 28.3525 39.1631 28.5147 40.1955 28.5147C41.5468 28.5147 42.6441 28.2012 43.4981 27.5741C43.8711 27.2985 44.2062 26.985 44.4981 26.6444C44.6386 26.4769 44.9143 26.5363 44.9629 26.7471C45.0386 27.1039 45.1845 27.4174 45.3954 27.6714C45.7683 28.1201 46.4656 28.3471 47.4764 28.3471H48.779C48.9304 28.3471 49.0493 28.2282 49.0493 28.0768V26.1526C49.0493 25.785 48.9304 25.7039 48.5088 25.7039H48.5034ZM44.5467 22.5311C44.5467 23.2229 44.39 23.8499 44.0711 24.4013C43.7522 24.9526 43.3035 25.385 42.7198 25.6931C42.1414 26.0012 41.4333 26.158 40.6117 26.158C39.7901 26.158 39.1631 25.9634 38.6874 25.5796C38.2118 25.1958 37.9685 24.704 37.9685 24.104C37.9685 23.3743 38.2172 22.8283 38.7145 22.4716C39.2118 22.1148 39.9252 21.9365 40.8658 21.9365H44.5467V22.5256V22.5311Z" fill="#191919"></path></svg></a><ul role="menubar" class="sc-dd041119-13 hxYec"><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 ifXtPt"><div class="sc-dd041119-15 fIvfJ"><span>Developers</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS vgaOL"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Developers</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Developer Center</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Code Samples</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/resources/guides" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Guides</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Identity Unlocked - Podcasts</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Zero Index Newsletter</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS juzMWM"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Developer Tools</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://openidconnect.net/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">OIDC Connect Playground</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://samltool.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">SAML Tool</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="http://jwt.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">JWT.io</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="http://webauthn.me/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Webauthn.me</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS cmuXnw"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Get Involved</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Events</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Auth0 Research Program</a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 ifXtPt"><div class="sc-dd041119-15 fIvfJ"><span>Documentation</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS elvwLW"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Documentation</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Auth0 Docs</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Articles</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Quickstarts</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">APIs</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">SDK Libraries</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS hkOlGh"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Support Center</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Community</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Support</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Help</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">FAQs</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Explore Auth0 Marketplace</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Resources</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS edUBug"><a href="/blog/getting-unlimited-scalability-with-okta-fine-grained-authorization/" rel="external" class="sc-1e1df8de-0 ihoJjn"><div class="sc-1e1df8de-1 jDuOPS"><img loading="lazy" src="https://cdn.auth0.com/website/website/cic-header/hero/blog-thumbnail.png" alt="" class="sc-1e1df8de-3 iiLmVo"/><div><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj eDrEVh">BLOG</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 eievug bdeJQk">Getting Unlimited Scalability with Okta Fine Grained Authorization</p></div></div></a><div class="sc-4b4277c0-0 fBHclw"></div><div class="sc-4b4277c0-1 cRKzFM"><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Blog</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Learn</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Intro to IAM (CIAM)</a></li></ul></div></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 ifXtPt"><div class="sc-dd041119-15 fIvfJ"><span>Product</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS vgaOL"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Platform</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Access Management</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Extensibility</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Security</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">User Management</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Authentication</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/fine-grained-authorization" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Fine Grained Authorization</a></li></ul><div class="sc-c4163730-4 eXTZJw"><a href="https://auth0.com/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cUdGaW gtyRnh">View platform</a></div></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS juzMWM"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Features</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Universal Login</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Single Sign On</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Multifactor Authentication</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Actions</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Machine to Machine</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Passwordless</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/features/breached-passwords" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Breached Passwords</a></li></ul><div class="sc-c4163730-4 eXTZJw"><a href="https://auth0.com/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cUdGaW gtyRnh">View features</a></div></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS ftjeVJ"><ul class="sc-31a2510-0 eqdKOL"><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/resources/videos/platform-introduction-video-2020" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Technology Overview</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Watch a walkthrough of the Auth0 Platform</p></div></a></li><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Cloud Deployments</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Deploy to the cloud, your way</p></div></a></li><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/marketplace" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Auth0 Marketplace</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Discover the integrations you need to solve identity</p></div></a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 ifXtPt"><div class="sc-dd041119-15 fIvfJ"><span>Solutions</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS elvwLW"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Industries</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/nonprofits" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Nonprofits & Charities</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/startups" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Startups</a></li></ul><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Your goals</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/secure-smarter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB"></secure smarter></a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS hkOlGh"><div class="sc-8583e179-0 kqrdVl"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj ierwBG">Use Cases</p><a rel="external" href="/b2c-customer-identity-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>Consumer Applications</span></a><a rel="external" href="/b2b-saas" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>B2B SaaS Applications</span></a><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj ierwBG">Case Studies</p><a rel="external" href="/customers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>Read our customers stories</span></a></div></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS edUBug"><a href="https://okta.valuestoryapp.com/okta/?utm_Origin=Auth0" rel="external" class="sc-1e1df8de-0 ihoJjn"><div class="sc-1e1df8de-1 jDuOPS"><img loading="lazy" src="https://cdn.auth0.com/website/header/ROI_thumb_2x.png" alt="" class="sc-1e1df8de-3 iiLmVo"/><div><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj eDrEVh">CIAM ROI Calculator</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 eievug bdeJQk">Estimate the revenue impact to your customer-facing business</p></div></div></a></section></section></div></li><li role="menuitem" aria-haspopup="false" tabindex="0" class="sc-dd041119-16 ifXtPt"><a href="/blog/" rel="external" class="sc-dd041119-15 fIvfJ"><span>Blog</span></a></li><li role="menuitem" aria-haspopup="false" class="sc-dd041119-16 ifXtPt"><a href="/pricing/" rel="external" class="sc-dd041119-15 fIvfJ"><span>Pricing</span></a></li></ul><div class="sc-dd041119-8 goqQNV"><a role="button" rel="external" href="/signup?place=header&type=button&text=sign%20up" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cJRWJS blScNC"><span>Sign up</span></a><a role="button" rel="external" href="/contact-us?place=header&type=button&text=contact%20sales" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 gsHAMX kRzliz"><span>Contact sales</span></a></div></div></nav></header><main><section class="sc-527f19d-0 goMtfQ"><div class="sc-527f19d-1 lhJrRr"><h1 class="styled__Heading-sc-165cfko-2 utils-sc-11hlfw-0 etkYET eHMTIY">Resources</h1><div class="sc-527f19d-5 fcFyPA"><div class="sc-527f19d-6 OrXVW"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="sc-527f19d-7 eEWXUq"><path d="M11 19a8 8 0 100-16 8 8 0 000 16zM21 21l-4.35-4.35" stroke="#606060" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path></svg><input type="text" placeholder="Search" class="sc-527f19d-8 cHZRhB" value=""/></div><div class="sc-527f19d-9 fGcUkc"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path d="M12 22c5.523 0 10-4.477 10-10S17.523 2 12 2 2 6.477 2 12s4.477 10 10 10zM2 12h20" stroke="#42464D"></path><path d="M12 2a15.3 15.3 0 014 10 15.3 15.3 0 01-4 10 15.3 15.3 0 01-4-10 15.3 15.3 0 014-10v0z" stroke="#42464D"></path></svg><select class="sc-527f19d-10 jgLKGs"><option value="" disabled="">Language</option><option value="EN" selected="">English</option><option value="DE">Deutsch</option><option value="ES">Español</option><option value="FR">Français</option><option value="JP">日本語</option><option value="PT">Português</option></select></div></div></div><div class="sc-527f19d-4 bSdvZL"><ul class="sc-527f19d-17 fIEFZB"><li class="sc-527f19d-18 iEGZFq"><a aria-label="link to resource " href="/resources">All</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/ebooks">Ebooks</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/webinars">Webinars</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/videos">Videos</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/whitepapers">Whitepapers</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/podcasts">Podcasts</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/resources/upcoming-webinars">Upcoming Webinars</a></li></ul></div><div class="sc-527f19d-3 fpOVHv"><a aria-label="link to Your one-stop buyers guide to Customer Identity" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/customer-identity-buyers-guide"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5tawZP6dVlIeytZhl3GDw6/ba04d38270667b9a2f116c8cbb8c6c06/Thumbnail__CustomerIdentityBuyer_sGuide_Auth0_Final.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5tawZP6dVlIeytZhl3GDw6/ba04d38270667b9a2f116c8cbb8c6c06/Thumbnail__CustomerIdentityBuyer_sGuide_Auth0_Final.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5tawZP6dVlIeytZhl3GDw6/ba04d38270667b9a2f116c8cbb8c6c06/Thumbnail__CustomerIdentityBuyer_sGuide_Auth0_Final.png?w=560" aria-hidden="false" alt="Your one-stop buyers guide to Customer Identity" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Your one-stop buyers guide to Customer Identity</h2></a><a aria-label="link to Make your UX dance with CIAM" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/improving-user-experiences-with-ciam"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560" aria-hidden="false" alt="Make your UX dance with CIAM" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">Make your UX dance with CIAM</h2></a><a aria-label="link to Build and scale your product faster" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/build-and-scale-market-leading-products-faster"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560" aria-hidden="false" alt="Build and scale your product faster" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">Build and scale your product faster</h2></a><a aria-label="link to Time to think about Customer Identity" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/why-customer-identity"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7wH4GbvPYj09XztWweXV8B/469ffea819bd7fd3ab13c41b103c0ab4/Thumbnail___Why_Customer_Identity.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7wH4GbvPYj09XztWweXV8B/469ffea819bd7fd3ab13c41b103c0ab4/Thumbnail___Why_Customer_Identity.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7wH4GbvPYj09XztWweXV8B/469ffea819bd7fd3ab13c41b103c0ab4/Thumbnail___Why_Customer_Identity.png?w=560" aria-hidden="false" alt="Time to think about Customer Identity" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Time to think about Customer Identity</h2></a><a aria-label="link to Why Auth0?" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/why-auth0-by-okta"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560" aria-hidden="false" alt="Why Auth0?" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">Why Auth0?</h2></a><a aria-label="link to Accelerate Innovation through Identity Management" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/accelerate-innovation-through-identity-management-infographic"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560" aria-hidden="false" alt="Accelerate Innovation through Identity Management" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">Accelerate Innovation through Identity Management</h2></a><a aria-label="link to Customer Identity and the extensibility imperative" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/extensibility-imperative"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7rU2uPiLBWL3eStfkfIN7Y/68720f6592c89f13d53323c38eed4203/Customer_Identity_and_the_extensibility_imperative_thumbnail.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7rU2uPiLBWL3eStfkfIN7Y/68720f6592c89f13d53323c38eed4203/Customer_Identity_and_the_extensibility_imperative_thumbnail.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7rU2uPiLBWL3eStfkfIN7Y/68720f6592c89f13d53323c38eed4203/Customer_Identity_and_the_extensibility_imperative_thumbnail.png?w=560" aria-hidden="false" alt=" Customer Identity and the extensibility imperative" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr"> Customer Identity and the extensibility imperative</h2></a><a aria-label="link to Connect your application to Salesforce with first-party data" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/connect-your-application-to-salesforce-with-first-party-data"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/VysxobtbFoaDtuPe2Umej/38be3a24e868af2c98054cfc1b18fe51/salesforce.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/VysxobtbFoaDtuPe2Umej/38be3a24e868af2c98054cfc1b18fe51/salesforce.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/VysxobtbFoaDtuPe2Umej/38be3a24e868af2c98054cfc1b18fe51/salesforce.png?w=560" aria-hidden="false" alt="Connect your application to Salesforce with first-party data" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Connect your application to Salesforce with first-party data</h2></a><a aria-label="link to Make your MFA adaptive with Actions templates" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/make-your-mfa-adaptive-with-actions-templates"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/6UqI2LfdkFzOs6FLcjsCOZ/68d83fa85778b3b17bc3e57a8f9c4fc7/mfa.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/6UqI2LfdkFzOs6FLcjsCOZ/68d83fa85778b3b17bc3e57a8f9c4fc7/mfa.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/6UqI2LfdkFzOs6FLcjsCOZ/68d83fa85778b3b17bc3e57a8f9c4fc7/mfa.png?w=560" aria-hidden="false" alt="Make your MFA adaptive with Actions templates" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Make your MFA adaptive with Actions templates</h2></a><a aria-label="link to Flag sensitive transactions for step-up authentication" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/flag-sensitive-transactions-for-step-up-authentication"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5P0xLQDy7VDilozAY3LUat/db3c0718b46e49a6091a41ff8786f810/flag.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5P0xLQDy7VDilozAY3LUat/db3c0718b46e49a6091a41ff8786f810/flag.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5P0xLQDy7VDilozAY3LUat/db3c0718b46e49a6091a41ff8786f810/flag.png?w=560" aria-hidden="false" alt="Flag sensitive transactions for step-up authentication" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Flag sensitive transactions for step-up authentication</h2></a><a aria-label="link to Auth0 Technical Directory" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/auth0-technical-directory"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5OqSPJIwNcdomQ7IWRT8F5/8b0bca73e9dd2f6eda0bb2941d4ead3b/Thumbnail__Technical_Directory.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5OqSPJIwNcdomQ7IWRT8F5/8b0bca73e9dd2f6eda0bb2941d4ead3b/Thumbnail__Technical_Directory.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5OqSPJIwNcdomQ7IWRT8F5/8b0bca73e9dd2f6eda0bb2941d4ead3b/Thumbnail__Technical_Directory.png?w=560" aria-hidden="false" alt="Auth0 Technical Directory" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Auth0 Technical Directory</h2></a><a aria-label="link to Infographic: Identity Security: The big Security Dimension" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/identity-security-the-big-security-dimension-infographic"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560" aria-hidden="false" alt="Infographic: Identity Security: The big Security Dimension" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">Infographic: Identity Security: The big Security Dimension</h2></a><a aria-label="link to Auth0 Buyers' Guide - Limitless potential. Unlocked." class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/auth0-buyers-guide"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5nBHtZp3xOukEjtN4Ncrut/5728782674924ffba6f897730ffd2ce1/Thumbnail_Buyers_Guid.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5nBHtZp3xOukEjtN4Ncrut/5728782674924ffba6f897730ffd2ce1/Thumbnail_Buyers_Guid.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5nBHtZp3xOukEjtN4Ncrut/5728782674924ffba6f897730ffd2ce1/Thumbnail_Buyers_Guid.png?w=560" aria-hidden="false" alt="Auth0 Buyers' Guide - Limitless potential. Unlocked." class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Auth0 Buyers' Guide - Limitless potential. Unlocked.</h2></a><a aria-label="link to SAML Authentication, Explained" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/saml-authentication-explained"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560" aria-hidden="false" alt="SAML Authentication, Explained" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">SAML Authentication, Explained</h2></a><a aria-label="link to Learn CIAM by example: 4 recipes to improve security and UX" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/learn-ciam-by-example"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2E5mGRpLVBa6FOTUZsKUCL/54fa4ef76b1db950ebb694029b5c033f/learn-ciam-by-example-cover.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2E5mGRpLVBa6FOTUZsKUCL/54fa4ef76b1db950ebb694029b5c033f/learn-ciam-by-example-cover.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2E5mGRpLVBa6FOTUZsKUCL/54fa4ef76b1db950ebb694029b5c033f/learn-ciam-by-example-cover.png?w=560" aria-hidden="false" alt="Learn CIAM by example: 4 recipes to improve security and UX" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Learn CIAM by example: 4 recipes to improve security and UX</h2></a><a aria-label="link to Build or buy" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/build-or-buy"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/42GgqAaRnWhNv4lfGWt6gv/a9d745c944f8b3b6ac5bd53afc4b9611/build-or-buy-thumbnail.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/42GgqAaRnWhNv4lfGWt6gv/a9d745c944f8b3b6ac5bd53afc4b9611/build-or-buy-thumbnail.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/42GgqAaRnWhNv4lfGWt6gv/a9d745c944f8b3b6ac5bd53afc4b9611/build-or-buy-thumbnail.png?w=560" aria-hidden="false" alt="Build or buy" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Build or buy</h2></a><a aria-label="link to JWT Handbook" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/jwt-handbook"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560" aria-hidden="false" alt="JWT Handbook" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">JWT Handbook</h2></a><a aria-label="link to Fine-Grained Authorization (FGA): A technical primer" class="sc-527f19d-12 gmktfe" href="/resources/whitepapers/fine-grained-authorization-technical-primer"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1oJDCHxnwlThw2zRQt6NbR/14c1556f3d99d92335ab2f0c9119c119/Fine-Grained-Authorization---Auth0.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1oJDCHxnwlThw2zRQt6NbR/14c1556f3d99d92335ab2f0c9119c119/Fine-Grained-Authorization---Auth0.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1oJDCHxnwlThw2zRQt6NbR/14c1556f3d99d92335ab2f0c9119c119/Fine-Grained-Authorization---Auth0.png?w=560" aria-hidden="false" alt="Fine-Grained Authorization (FGA): A technical primer" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Whitepapers</p><h2 class="sc-527f19d-14 kkgLIr">Fine-Grained Authorization (FGA): A technical primer</h2></a><a aria-label="link to The Passkeys Handbook" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/the-passkeys-handbook"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560" aria-hidden="false" alt="The Passkeys Handbook" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">The Passkeys Handbook</h2></a><a aria-label="link to .NET Identity with Auth0" class="sc-527f19d-12 gmktfe" href="/resources/ebooks/net-identity-with-auth0"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560" aria-hidden="false" alt=".NET Identity with Auth0" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Ebooks</p><h2 class="sc-527f19d-14 kkgLIr">.NET Identity with Auth0</h2></a></div><nav aria-label="pagination" class="sc-59b87673-0 cxBAMi"><ul class="sc-59b87673-1 jYbkpB"><li aria-current="true" aria-label="Page 1" class="sc-59b87673-2 kELnws">1</li><li aria-current="false" aria-label="Page 2" class="sc-59b87673-2 ldfsQT">2</li><li aria-current="false" aria-label="Page 3" class="sc-59b87673-2 ldfsQT">3</li><li aria-current="false" aria-label="Page 4" class="sc-59b87673-2 ldfsQT">4</li><li aria-current="false" aria-label="Page 5" class="sc-59b87673-2 ldfsQT">5</li><li aria-current="false" aria-label="Page 6" class="sc-59b87673-2 ldfsQT">6</li><li aria-current="false" aria-label="Page 7" class="sc-59b87673-2 ldfsQT">7</li><li aria-current="false" aria-label="Page 8" class="sc-59b87673-2 ldfsQT">8</li><li aria-current="false" aria-label="Page 9" class="sc-59b87673-2 ldfsQT">9</li><li aria-current="false" aria-label="Page 10" class="sc-59b87673-2 ldfsQT">10</li><li aria-current="false" aria-label="Page 11" class="sc-59b87673-2 ldfsQT">11</li><li aria-current="false" aria-label="Page 12" class="sc-59b87673-2 ldfsQT">12</li><li aria-current="false" aria-label="Page 13" class="sc-59b87673-2 ldfsQT">13</li><li aria-current="false" aria-label="Page 14" class="sc-59b87673-2 ldfsQT">14</li><li href="/resources/page2" class="sc-59b87673-2 ldfsQT"><svg width="13" height="11" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M1 10l4.5-4.5L1 1M7 10l4.5-4.5L7 1" stroke="#000" stroke-width="2"></path></svg></li></ul></nav></section><section class="sc-3e4086c7-0 hdUzyc"><div class="sc-3e4086c7-1 fEObSb"><h3 class="sc-3e4086c7-2 eBkOFK"><span><p>Secure access for everyone.<br /> But not just anyone.</p> </span></h3><div class="sc-3e4086c7-3 ggNbtU"><button class="sc-3e4086c7-4 hwtIDu">Try Auth0 for free</button><button class="sc-3e4086c7-4 cNWeht">Talk to sales</button></div></div></section></main><div class="sc-da5983f0-0 fvscCL"><footer class="sc-da5983f0-1 ezfOZF"><nav class="sc-da5983f0-2 fKRHFw"><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Developers</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Developer Hub<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Code Samples and Guides<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/blog/developers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog posts<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Identity Unlocked - Podcasts<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Zero Index Newsletter<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Documentation</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Articles<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Quickstarts<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">APIs<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">SDK Libraries<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/resources/ebooks" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Reports<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/resources/webinars" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Webinars<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Support Center</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Community<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Support<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Help<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">FAQs<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Auth0 Marketplace<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Company</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/customers" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Our Customers<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Compliance - Ensuring privacy and security<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/partners" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Partners<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://www.okta.com/company/careers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Careers<!-- --> <span class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 gDDDRz dmQvNV">We're hiring!</span></a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://www.okta.com/company/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">About us<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Get Involved</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Events<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Auth0 Research Program<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Learning</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Learn<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Intro to IAM (CIAM)<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Platform</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Access Management<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Extensibility<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Security<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">User Management<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Authentication<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Cloud deployments<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/fine-grained-authorization" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Fine Grained Authorization<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Features</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Universal Login<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Single Sign On<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Multifactor Authentication<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Actions<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Machine to Machine<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Passwordless<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/features/breached-passwords" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Breached Passwords<!-- --> </a></li></ul></section><section class="sc-da5983f0-6 dsTXTr"><div class="sc-da5983f0-7 bkTsFr"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 kuTTBJ"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div></section></nav><section class="sc-da5983f0-10 dceiQn"><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU hTUVnp">© <!-- -->2025<!-- --> Okta, Inc. All Rights Reserved.</p><div class="sc-da5983f0-12 fMOddY"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 kwdIoB"><span class="sc-da5983f0-17 fWXPij"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iBuHa-D">English</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 doMXBO"><ul class="sc-da5983f0-15 eZHkDb"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 hYxKnm">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 hYxKnm">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 hYxKnm">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 hYxKnm">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 hYxKnm">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 hYxKnm">日本語</li></ul></div></span></span></section><section class="sc-da5983f0-9 dFYjGw"><div class="sc-da5983f0-7 gtvNxS"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 kuTTBJ"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div><div class="sc-da5983f0-11 bfQQBn"><div class="sc-da5983f0-12 fMOddY"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 kwdIoB"><span class="sc-da5983f0-17 fWXPij"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iBuHa-D">English</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 doMXBO"><ul class="sc-da5983f0-15 eZHkDb"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 hYxKnm">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 hYxKnm">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 hYxKnm">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 hYxKnm">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 hYxKnm">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 hYxKnm">日本語</li></ul></div></span></span></div><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU csKyZk">© <!-- -->2025<!-- --> Okta, Inc. All Rights Reserved.</p></section></footer></div><div id="asset-library-root"></div><iframe id="drift-iframe" src="https://drift.app.auth0.com/drift-iframe" title="Drift iframe" style="width:0;height:0;border:none;position:absolute"></iframe><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-W7FRLJ" height="0" width="0" style="display:none;visibility:hidden" title="gtm"></iframe></noscript></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"lang":"en","data":[{"type":"whitepapers","updatedAt":"2025-02-13T15:14:53.360Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5tawZP6dVlIeytZhl3GDw6","type":"Asset","createdAt":"2025-02-11T13:16:40.963Z","updatedAt":"2025-02-13T13:04:49.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"Thumbnail CustomerIdentityBuyer’sGuide Auth0 Final","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5tawZP6dVlIeytZhl3GDw6/ba04d38270667b9a2f116c8cbb8c6c06/Thumbnail__CustomerIdentityBuyer_sGuide_Auth0_Final.png","details":{"size":157731,"image":{"width":600,"height":685}},"fileName":"Thumbnail__CustomerIdentityBuyer_sGuide_Auth0_Final.png","contentType":"image/png"}}},"title":"Your one-stop buyers guide to Customer Identity","id":"customer-identity-buyers-guide","language":"EN"},{"type":"ebooks","updatedAt":"2025-02-13T12:57:52.838Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6gFTmCtoggWJnOWML2km5Y","type":"Asset","createdAt":"2025-02-11T14:33:25.406Z","updatedAt":"2025-02-13T12:57:48.545Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Thumbnail Improving User Experiences with CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png","details":{"size":155325,"image":{"width":600,"height":688}},"fileName":"Thumbnail___Improving_User_Experiences_with_CIAM.png","contentType":"image/png"}}},"title":"Make your UX dance with CIAM","id":"improving-user-experiences-with-ciam","language":"EN"},{"type":"ebooks","updatedAt":"2025-02-13T12:55:22.892Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ibtZHIHLm5dohK1GfSzyg","type":"Asset","createdAt":"2025-02-11T14:26:23.490Z","updatedAt":"2025-02-13T12:50:59.488Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"Thumbnail Accelerating Success","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png","details":{"size":111318,"image":{"width":600,"height":682}},"fileName":"Thumbnail___Accelerating_Success.png","contentType":"image/png"}}},"title":"Build and scale your product faster","id":"build-and-scale-market-leading-products-faster","language":"EN"},{"type":"whitepapers","updatedAt":"2025-02-13T12:49:35.750Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7wH4GbvPYj09XztWweXV8B","type":"Asset","createdAt":"2025-02-11T13:08:42.510Z","updatedAt":"2025-02-13T12:49:30.950Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Thumbnail Why Customer Identity","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7wH4GbvPYj09XztWweXV8B/469ffea819bd7fd3ab13c41b103c0ab4/Thumbnail___Why_Customer_Identity.png","details":{"size":199300,"image":{"width":600,"height":779}},"fileName":"Thumbnail _ Why Customer Identity.png","contentType":"image/png"}}},"title":"Time to think about Customer Identity","id":"why-customer-identity","language":"EN"},{"type":"ebooks","updatedAt":"2025-02-13T12:46:52.434Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"746ffBBzccujBPMo8iRpwX","type":"Asset","createdAt":"2025-02-11T12:58:15.415Z","updatedAt":"2025-02-13T12:46:28.821Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Thumbnail WhyAuth0 eBook 02062025","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png","details":{"size":142434,"image":{"width":600,"height":776}},"fileName":"Thumbnail _ WhyAuth0_eBook_02062025.png","contentType":"image/png"}}},"title":"Why Auth0?","id":"why-auth0-by-okta","language":"EN"},{"type":"ebooks","updatedAt":"2025-02-13T12:42:31.862Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1rieO7ZYFtv2KsICGyOlQu","type":"Asset","createdAt":"2025-02-11T12:48:57.545Z","updatedAt":"2025-02-13T12:41:56.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"Thumbnail How to Accelerate Innovation","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png","details":{"size":311076,"image":{"width":600,"height":681}},"fileName":"Thumbnail___How_to_Accelerate_Innovation.png","contentType":"image/png"}}},"title":"Accelerate Innovation through Identity Management","id":"accelerate-innovation-through-identity-management-infographic","language":"EN"},{"type":"whitepapers","updatedAt":"2025-02-10T19:41:14.195Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7rU2uPiLBWL3eStfkfIN7Y","type":"Asset","createdAt":"2025-02-10T18:57:15.229Z","updatedAt":"2025-02-10T19:41:07.947Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Customer Identity and the extensibility imperative | Auth0 ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7rU2uPiLBWL3eStfkfIN7Y/68720f6592c89f13d53323c38eed4203/Customer_Identity_and_the_extensibility_imperative_thumbnail.png","details":{"size":174517,"image":{"width":600,"height":856}},"fileName":"Customer Identity and the extensibility imperative thumbnail.png","contentType":"image/png"}}},"title":" Customer Identity and the extensibility imperative","id":"extensibility-imperative","language":"EN"},{"type":"whitepapers","updatedAt":"2024-12-06T18:09:49.039Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"VysxobtbFoaDtuPe2Umej","type":"Asset","createdAt":"2024-12-06T18:09:40.129Z","updatedAt":"2024-12-06T18:09:40.129Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"salesforce","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/VysxobtbFoaDtuPe2Umej/38be3a24e868af2c98054cfc1b18fe51/salesforce.png","details":{"size":185463,"image":{"width":600,"height":776}},"fileName":"salesforce.png","contentType":"image/png"}}},"title":"Connect your application to Salesforce with first-party data","id":"connect-your-application-to-salesforce-with-first-party-data","language":"EN"},{"type":"whitepapers","updatedAt":"2024-12-06T18:08:11.783Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6UqI2LfdkFzOs6FLcjsCOZ","type":"Asset","createdAt":"2024-12-06T18:08:07.030Z","updatedAt":"2024-12-06T18:08:07.030Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"mfa","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6UqI2LfdkFzOs6FLcjsCOZ/68d83fa85778b3b17bc3e57a8f9c4fc7/mfa.png","details":{"size":357083,"image":{"width":600,"height":776}},"fileName":"mfa.png","contentType":"image/png"}}},"title":"Make your MFA adaptive with Actions templates","id":"make-your-mfa-adaptive-with-actions-templates","language":"EN"},{"type":"whitepapers","updatedAt":"2024-12-06T18:06:06.945Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5P0xLQDy7VDilozAY3LUat","type":"Asset","createdAt":"2024-12-06T18:06:01.525Z","updatedAt":"2024-12-06T18:06:01.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"flag","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5P0xLQDy7VDilozAY3LUat/db3c0718b46e49a6091a41ff8786f810/flag.png","details":{"size":188467,"image":{"width":600,"height":776}},"fileName":"flag.png","contentType":"image/png"}}},"title":"Flag sensitive transactions for step-up authentication","id":"flag-sensitive-transactions-for-step-up-authentication","language":"EN"},{"type":"whitepapers","updatedAt":"2024-12-05T20:07:28.153Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5OqSPJIwNcdomQ7IWRT8F5","type":"Asset","createdAt":"2024-12-05T20:04:36.162Z","updatedAt":"2024-12-05T20:04:36.162Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Thumbnail Technical Directory","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5OqSPJIwNcdomQ7IWRT8F5/8b0bca73e9dd2f6eda0bb2941d4ead3b/Thumbnail__Technical_Directory.png","details":{"size":222157,"image":{"width":600,"height":776}},"fileName":"Thumbnail__Technical Directory.png","contentType":"image/png"}}},"title":"Auth0 Technical Directory","id":"auth0-technical-directory","language":"EN"},{"type":"ebooks","updatedAt":"2024-12-05T19:06:59.339Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7x3mPVtrXIccXMaxDIrnmE","type":"Asset","createdAt":"2024-12-05T10:15:39.048Z","updatedAt":"2024-12-05T10:15:39.048Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Identity Security: The big Security Dimension","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png","details":{"size":211961,"image":{"width":600,"height":776}},"fileName":"Thumbnail_Identity_Security2.png","contentType":"image/png"}}},"title":"Infographic: Identity Security: The big Security Dimension","id":"identity-security-the-big-security-dimension-infographic","language":"EN"},{"type":"whitepapers","updatedAt":"2024-12-05T19:06:53.825Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5nBHtZp3xOukEjtN4Ncrut","type":"Asset","createdAt":"2024-12-05T10:22:45.846Z","updatedAt":"2024-12-05T10:22:45.846Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Buyers' Guide - Limitless potential. Unlocked.","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5nBHtZp3xOukEjtN4Ncrut/5728782674924ffba6f897730ffd2ce1/Thumbnail_Buyers_Guid.png","details":{"size":347173,"image":{"width":600,"height":776}},"fileName":"Thumbnail_Buyers_Guid.png","contentType":"image/png"}}},"title":"Auth0 Buyers' Guide - Limitless potential. Unlocked.","id":"auth0-buyers-guide","language":"EN"},{"type":"ebooks","updatedAt":"2024-11-13T18:57:23.516Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7C3Fx4nE9sQGo8HsLNdg85","type":"Asset","createdAt":"2022-02-23T23:23:42.953Z","updatedAt":"2024-11-12T15:01:51.481Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":4,"locale":"en-US"},"fields":{"description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png","details":{"size":262010,"image":{"width":600,"height":777}},"fileName":"Cover_only.png","contentType":"image/png"}}},"title":"SAML Authentication, Explained","id":"saml-authentication-explained","language":"EN"},{"type":"whitepapers","updatedAt":"2024-09-25T19:38:13.333Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2E5mGRpLVBa6FOTUZsKUCL","type":"Asset","createdAt":"2024-05-31T11:40:46.726Z","updatedAt":"2024-05-31T11:46:15.950Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"learn-ciam-by-example-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2E5mGRpLVBa6FOTUZsKUCL/54fa4ef76b1db950ebb694029b5c033f/learn-ciam-by-example-cover.png","details":{"size":203407,"image":{"width":600,"height":776}},"fileName":"learn-ciam-by-example-cover.png","contentType":"image/png"}}},"title":"Learn CIAM by example: 4 recipes to improve security and UX","id":"learn-ciam-by-example","language":"EN"},{"type":"whitepapers","updatedAt":"2024-09-25T19:36:36.910Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"42GgqAaRnWhNv4lfGWt6gv","type":"Asset","createdAt":"2024-07-31T17:49:25.700Z","updatedAt":"2024-07-31T20:37:59.490Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Build or buy Auth0-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/42GgqAaRnWhNv4lfGWt6gv/a9d745c944f8b3b6ac5bd53afc4b9611/build-or-buy-thumbnail.png","details":{"size":245120,"image":{"width":600,"height":776}},"fileName":"build-or-buy-thumbnail.png","contentType":"image/png"}}},"title":"Build or buy","id":"build-or-buy","language":"EN"},{"type":"ebooks","updatedAt":"2024-09-25T19:35:32.077Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2B6gm5HYfueAYcos424oum","type":"Asset","createdAt":"2018-03-06T15:33:38.907Z","updatedAt":"2024-06-05T13:50:26.247Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":5,"locale":"en-US"},"fields":{"title":"eBook JWT Handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png","details":{"size":130598,"image":{"width":600,"height":856}},"fileName":"Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png","contentType":"image/png"}}},"title":"JWT Handbook","id":"jwt-handbook","language":"EN"},{"type":"whitepapers","updatedAt":"2024-08-20T19:09:06.757Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1oJDCHxnwlThw2zRQt6NbR","type":"Asset","createdAt":"2024-08-19T16:39:00.671Z","updatedAt":"2024-08-20T18:22:01.378Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Fine-Grained Authorization - Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1oJDCHxnwlThw2zRQt6NbR/14c1556f3d99d92335ab2f0c9119c119/Fine-Grained-Authorization---Auth0.png","details":{"size":187586,"image":{"width":600,"height":776}},"fileName":"Fine-Grained-Authorization---Auth0.png","contentType":"image/png"}}},"title":"Fine-Grained Authorization (FGA): A technical primer","id":"fine-grained-authorization-technical-primer","language":"EN"},{"type":"ebooks","updatedAt":"2024-07-09T12:52:06.401Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"eQGisKo3KuzNG5iHP5OXq","type":"Asset","createdAt":"2024-07-03T12:04:01.000Z","updatedAt":"2024-07-03T13:14:06.302Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"The Passkeys Handbook - Resource page thumbnail","description":"The Passkeys Handbook - Resource page thumbnail","file":{"url":"//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png","details":{"size":243469,"image":{"width":600,"height":777}},"fileName":"Cover_only (1).png","contentType":"image/png"}}},"title":"The Passkeys Handbook","id":"the-passkeys-handbook","language":"EN"},{"type":"ebooks","updatedAt":"2024-03-26T10:28:16.393Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"17p4gILruAd4I0v5za93Gl","type":"Asset","createdAt":"2022-09-16T21:24:02.135Z","updatedAt":"2022-09-19T16:06:09.023Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":".NET Identity with Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg","details":{"size":112797,"image":{"width":600,"height":856}},"fileName":"Landing Page-.NET Identity with Auth0.jpeg","contentType":"image/jpeg"}}},"title":".NET Identity with Auth0","id":"net-identity-with-auth0","language":"EN"},{"type":"ebooks","updatedAt":"2023-11-02T17:23:03.268Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6GnjSym6UsMQ4ee46mQDzl","type":"Asset","createdAt":"2023-11-01T13:37:28.437Z","updatedAt":"2023-11-02T17:09:49.361Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Screenshot 2023-10-30 at 16.37.14","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6GnjSym6UsMQ4ee46mQDzl/0eddfdb915b5dbcc2b7fbb15a52726ab/Screenshot_2023-10-30_at_16.37.14.png","details":{"size":318244,"image":{"width":600,"height":856}},"fileName":"Screenshot 2023-10-30 at 16.37.14.png","contentType":"image/png"}}},"title":"The Ultimate Guide to Content Security Policy (CSP)","id":"the-ultimate-guide-to-csp","language":"EN"},{"type":"ebooks","updatedAt":"2023-08-09T15:35:21.059Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"f5Nvn50DZqeLonsg75SnG","type":"Asset","createdAt":"2021-06-24T16:24:59.538Z","updatedAt":"2021-06-24T16:24:59.538Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Implementing MFA in React Using Auth0 and AWS Amplify","file":{"url":"//images.ctfassets.net/2ntc334xpx65/f5Nvn50DZqeLonsg75SnG/17ad9470af8a451e01fa1a1c858de3f9/Auth0_AWS_Amplify_eBook_Cover.jpg","details":{"size":173469,"image":{"width":600,"height":856}},"fileName":"Auth0+AWS Amplify eBook_Cover.jpg","contentType":"image/jpeg"}}},"title":"Implementing MFA in React Using Auth0 and AWS Amplify","id":"implementing-mfa-in-react-using-auth0-aws","language":"EN"},{"type":"webinars","updatedAt":"2023-06-14T19:13:08.651Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5AL9ilnSatCnliLuUSCVon","type":"Asset","createdAt":"2023-06-14T16:59:18.977Z","updatedAt":"2023-06-14T17:00:05.936Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Identity-first for truly personalised retail experiences","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5AL9ilnSatCnliLuUSCVon/55ae4d2728371fee966b2b7798ef606d/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":90012,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Identity-first for truly personalised retail experiences","id":"identity-first-for-truly-personalised-retail-experiences","language":"EN"},{"type":"ebooks","updatedAt":"2023-06-08T21:53:30.268Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2MI8l4l0Cka4q3IAQebIhi","type":"Asset","createdAt":"2023-06-08T21:37:57.310Z","updatedAt":"2023-06-08T21:43:44.079Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Angular Handbook: Identity and State Management","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2MI8l4l0Cka4q3IAQebIhi/8d1dca0bd696978227ed39ea363be8e1/AngularHandbook-cover.jpg","details":{"size":43988,"image":{"width":600,"height":856}},"fileName":"AngularHandbook-cover.jpg","contentType":"image/jpeg"}}},"title":"Angular Handbook: Identity and State Management","id":"angular-handbook-identity-and-state-management","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T19:56:14.162Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"hvMDig7Qz2B5pvhV1nxqg","type":"Asset","createdAt":"2023-03-03T19:49:49.379Z","updatedAt":"2023-03-03T19:49:49.379Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 4","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg","details":{"size":142786,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A4.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 4 Brief","id":"secured-and-assured-unit-4-brief","language":"EN"},{"type":"ebooks","updatedAt":"2023-03-03T19:53:17.315Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"hvMDig7Qz2B5pvhV1nxqg","type":"Asset","createdAt":"2023-03-03T19:49:49.379Z","updatedAt":"2023-03-03T19:49:49.379Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 4","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg","details":{"size":142786,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A4.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 4 Workbook","id":"secured-and-assured-unit-4-workbook","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T19:44:39.884Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2IGhBthTYcD52tr8DN3Ehi","type":"Asset","createdAt":"2023-03-03T19:33:55.126Z","updatedAt":"2023-03-03T19:34:03.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 3","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg","details":{"size":185554,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A3.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 3 Brief","id":"secured-and-assured-unit-3-brief","language":"EN"},{"type":"ebooks","updatedAt":"2023-03-03T19:40:09.208Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2IGhBthTYcD52tr8DN3Ehi","type":"Asset","createdAt":"2023-03-03T19:33:55.126Z","updatedAt":"2023-03-03T19:34:03.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 3","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg","details":{"size":185554,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A3.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 3 Workbook","id":"secured-and-assured-unit-3-workbook","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T19:27:18.284Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"239s2QBg4WwGpf5Q1yK07U","type":"Asset","createdAt":"2023-03-03T19:15:37.560Z","updatedAt":"2023-03-03T19:40:55.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 2","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg","details":{"size":156288,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A2.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 2 Brief","id":"secured-and-assured-unit-2-brief","language":"EN"},{"type":"ebooks","updatedAt":"2023-03-03T19:19:59.068Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"239s2QBg4WwGpf5Q1yK07U","type":"Asset","createdAt":"2023-03-03T19:15:37.560Z","updatedAt":"2023-03-03T19:40:55.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 2","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg","details":{"size":156288,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A2.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 2 Workbook","id":"secured-and-assured-unit-2-workbook","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T19:07:38.368Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ZT55dKPgWbvAmBoNIMKUT","type":"Asset","createdAt":"2023-03-03T18:34:10.775Z","updatedAt":"2023-03-03T18:45:31.671Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 1","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg","details":{"size":109656,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A1.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 1 Brief","id":"secured-and-assured-unit-1-brief","language":"EN"},{"type":"ebooks","updatedAt":"2023-03-03T18:57:17.395Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ZT55dKPgWbvAmBoNIMKUT","type":"Asset","createdAt":"2023-03-03T18:34:10.775Z","updatedAt":"2023-03-03T18:45:31.671Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 1","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg","details":{"size":109656,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A1.jpeg","contentType":"image/jpeg"}}},"title":"Secured and Assured Unit 1 Workbook","id":"secured-and-assured-unit-1-workbook","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T16:48:40.791Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2Wq3Fb90KMpTqLfp9DDkkf","type":"Asset","createdAt":"2023-03-03T16:47:46.829Z","updatedAt":"2023-03-03T16:47:46.829Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Case Study: NCBI","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2Wq3Fb90KMpTqLfp9DDkkf/4820e007c79a0159fd4e5af9ac213ade/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":108323,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Case Study: NCBI","id":"case-study-ncbi","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T16:31:46.678Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"23mVwcvK3BpJqdq4UjqR1w","type":"Asset","createdAt":"2023-03-03T16:30:54.167Z","updatedAt":"2023-03-03T16:30:54.167Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Case Study: The Last Mile.Org ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/23mVwcvK3BpJqdq4UjqR1w/de9e22fa1f6c76833a147f81ca0ecfea/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":112982,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Case Study: The Last Mile.Org","id":"case-study-the-last-mileorg","language":"EN"},{"type":"whitepapers","updatedAt":"2023-03-03T15:03:28.659Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"dty2SclSUsB5GN2YJuDHB","type":"Asset","createdAt":"2023-03-03T15:00:53.206Z","updatedAt":"2023-03-03T15:03:13.445Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"How Auth0 Satisfies Cyber Essentials Technical Control Themes","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/dty2SclSUsB5GN2YJuDHB/2bae771c4157251cc2bdb6c74f2e687b/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":151913,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"How Auth0 Satisfies Cyber Essentials Technical Control Themes","id":"cyber-essentials-technical-control-themes","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:34:34.960Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aYsfH7iy9mvAuuMKdFYDO","type":"Asset","createdAt":"2023-01-26T18:35:09.989Z","updatedAt":"2023-01-26T18:35:09.989Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"S04IDUnlocked","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6aYsfH7iy9mvAuuMKdFYDO/683c2a2b3f221e4bf4a905ddb2f6d331/S04IDUnlocked_thumbnail.jpg","details":{"size":80241,"image":{"width":764,"height":892}},"fileName":"S04IDUnlocked thumbnail.jpg","contentType":"image/jpeg"}}},"title":"Daniel Fett on privacy-preserving measures and SD-JWT","id":"S4E004IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:33:15.474Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aYsfH7iy9mvAuuMKdFYDO","type":"Asset","createdAt":"2023-01-26T18:35:09.989Z","updatedAt":"2023-01-26T18:35:09.989Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"S04IDUnlocked","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6aYsfH7iy9mvAuuMKdFYDO/683c2a2b3f221e4bf4a905ddb2f6d331/S04IDUnlocked_thumbnail.jpg","details":{"size":80241,"image":{"width":764,"height":892}},"fileName":"S04IDUnlocked thumbnail.jpg","contentType":"image/jpeg"}}},"title":"SAML with Joni Brennan, Paul Madsen and Prateek Mishra","id":"S4E003IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:31:52.387Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aYsfH7iy9mvAuuMKdFYDO","type":"Asset","createdAt":"2023-01-26T18:35:09.989Z","updatedAt":"2023-01-26T18:35:09.989Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"S04IDUnlocked","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6aYsfH7iy9mvAuuMKdFYDO/683c2a2b3f221e4bf4a905ddb2f6d331/S04IDUnlocked_thumbnail.jpg","details":{"size":80241,"image":{"width":764,"height":892}},"fileName":"S04IDUnlocked thumbnail.jpg","contentType":"image/jpeg"}}},"title":"Windows CardSpace with Stuart Kwan","id":"S4E002IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:28:30.968Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aYsfH7iy9mvAuuMKdFYDO","type":"Asset","createdAt":"2023-01-26T18:35:09.989Z","updatedAt":"2023-01-26T18:35:09.989Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"S04IDUnlocked","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6aYsfH7iy9mvAuuMKdFYDO/683c2a2b3f221e4bf4a905ddb2f6d331/S04IDUnlocked_thumbnail.jpg","details":{"size":80241,"image":{"width":764,"height":892}},"fileName":"S04IDUnlocked thumbnail.jpg","contentType":"image/jpeg"}}},"title":"FIDO Multi Device Credentials with Andrew Shikiar and Tim Cappalli","id":"S4E001IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:27:24.754Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"The Mobile Driving License Spec with Andrew Hughes","id":"S3E006IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:25:46.011Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"OpenID Connect with Mike Jones","id":"S3E005IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:24:17.002Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"Decentralized Identity and OpenID Connect","id":"S3E004IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:22:04.076Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"Authorization with David Brossard","id":"S3E002IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:19:56.775Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"System for Cross Domain Identity Management (SCIM)","id":"S3E001IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:16:30.853Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"Bonus Episode: Identiverse 2021 with Ian Glazer","id":"S2E009IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2023-01-26T19:10:04.898Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ryAmROBQ5XPo772h0M7KZ","type":"Asset","createdAt":"2023-01-26T13:32:40.817Z","updatedAt":"2023-01-26T13:32:40.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Thumbnail","description":"N/A","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ryAmROBQ5XPo772h0M7KZ/63021defd6713fcb1142e63608a71a97/S03IDUnlocked_thumbnail.png","details":{"size":335220,"image":{"width":625,"height":892}},"fileName":"S03IDUnlocked thumbnail.png","contentType":"image/png"}}},"title":"Global Assured Identity Network (GAIN)","id":"S3E003IDUnlocked","language":"EN"},{"type":"videos","updatedAt":"2022-11-09T17:26:03.570Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5NhZCfTAftLx7eGrgucuUl","type":"Asset","createdAt":"2020-08-04T19:19:54.816Z","updatedAt":"2020-08-04T19:19:54.816Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5NhZCfTAftLx7eGrgucuUl/c3f8b28860c33a9a9947343aed456968/Resources_Page__Cover.png","details":{"size":88625,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.png","contentType":"image/png"}}},"title":"Auth0 Introduction","id":"platform-introduction-video-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-11-03T21:00:14.492Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ETskVb5oX4Qien0QVGnyP","type":"Asset","createdAt":"2022-11-03T20:07:19.584Z","updatedAt":"2022-11-03T21:00:10.390Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Going Deeper with Social Login: A New Analysis","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ETskVb5oX4Qien0QVGnyP/01bfd1e90df0317890b4c09541fedb29/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":144688,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Why Choose Social Login?","id":"why-choose-social-login","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-26T16:35:33.713Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6iQtdFVHZuqYXpBpsVJ41e","type":"Asset","createdAt":"2021-06-10T21:56:07.991Z","updatedAt":"2022-09-26T16:59:04.248Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":4,"locale":"en-US"},"fields":{"title":"2021 State of Secure Identity Report","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6iQtdFVHZuqYXpBpsVJ41e/37a0d7307e8f197b5eb11f3c79f0327a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":1202439,"image":{"width":3534,"height":5000}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"2021 State of Secure Identity Report","id":"state-of-security-identity-report","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-22T21:26:32.079Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2enIs6tamYOMGhgSrZFZWZ","type":"Asset","createdAt":"2022-09-22T21:26:23.250Z","updatedAt":"2022-09-22T21:26:23.250Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Enterprise-Ready Identity Guide","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2enIs6tamYOMGhgSrZFZWZ/8a88fb944f787f60065142d327b173e8/Enterprise-Ready_Identity_Guide_-_Thumbnail.png","details":{"size":394646,"image":{"width":600,"height":856}},"fileName":"Enterprise-Ready Identity Guide - Thumbnail.png","contentType":"image/png"}}},"title":"Enterprise-Ready Identity","id":"enterprise-ready-identity","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-21T14:39:33.987Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HhAd9yNPRoOrnOShb1izR","type":"Asset","createdAt":"2022-09-21T14:09:06.438Z","updatedAt":"2022-09-21T14:10:31.760Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2022 State of Secure Identity Report","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HhAd9yNPRoOrnOShb1izR/22c192e2f0378941e9b4196d7f919f22/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":103715,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"2022 State of Secure Identity Report","id":"2022-state-of-secure-identity-report","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T21:12:58.321Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1YHUs0QNRdhg0jV2dSYkAg","type":"Asset","createdAt":"2021-06-23T21:41:09.044Z","updatedAt":"2021-06-24T17:01:43.928Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"How Headspace Scaled Identity and Minimized Security Risk","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1YHUs0QNRdhg0jV2dSYkAg/0c2dee37eb63c0dffe3199d9166fd49a/Headspace_Webinar_Cover_Image.jpeg","details":{"size":162777,"image":{"width":600,"height":856}},"fileName":"Headspace Webinar Cover Image.jpeg","contentType":"image/jpeg"}}},"title":"How Headspace Scaled Identity and Minimized Security Risk","id":"headspace-aws-auth0-security","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T20:59:03.179Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1vni3Zd81ewnohLXgfmUAH","type":"Asset","createdAt":"2020-03-17T18:12:54.253Z","updatedAt":"2020-03-17T18:12:54.253Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Live from Australia] Build or Buy your Customer Identity Platform","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1vni3Zd81ewnohLXgfmUAH/bee7e23854ee7d053261151b3c46a79a/_Live_from_Australia__Build_or_Buy_your_Customer_Identity_Platform.png","details":{"size":296196,"image":{"width":600,"height":856}},"fileName":"[Live from Australia] Build or Buy your Customer Identity Platform.png","contentType":"image/png"}}},"title":" Build or Buy a Customer Identity Platform?","id":"build-or-buy-a-customer-identity-platform","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T20:49:12.130Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"AE5C2FvxvUjNa75z6os6M","type":"Asset","createdAt":"2019-10-03T21:10:42.184Z","updatedAt":"2019-11-06T11:20:29.549Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":2,"locale":"en-US"},"fields":{"title":"PersonalCybersecurityChecklist-Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/AE5C2FvxvUjNa75z6os6M/ae246135bfe77d68372343fba604479c/PersonalCybersecurityChecklist_2x.png","details":{"size":95576,"image":{"width":600,"height":856}},"fileName":"PersonalCybersecurityChecklist@2x.png","contentType":"image/png"}}},"title":"Personal Cybersecurity Checklist","id":"personal-cybersecurity-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T18:52:24.841Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1nNWXdHcBFftid3ZsFssuu","type":"Asset","createdAt":"2022-08-19T23:50:12.389Z","updatedAt":"2022-09-10T17:53:44.924Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn Re-Welcome Pack","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1nNWXdHcBFftid3ZsFssuu/5bf7cbc7b8e32425ebb91d656775cbc8/loginnrewelcomepackthumbnail.png","details":{"size":617026,"image":{"width":600,"height":856}},"fileName":"loginnrewelcomepackthumbnail.png","contentType":"image/png"}}},"title":"The Log Inn Re-Welcome Pack","id":"log-inn-re-welcome-pack","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T18:52:11.136Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6kjqpyfjHAMIQXPxcOBKRC","type":"Asset","createdAt":"2022-09-10T17:57:55.883Z","updatedAt":"2022-09-10T17:58:17.803Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn CIAM Buyer's Guide","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6kjqpyfjHAMIQXPxcOBKRC/a13f3cf3d522dfe43372d39db4642eab/loginnciambuyersguidethumbnail.png","details":{"size":652142,"image":{"width":600,"height":856}},"fileName":"loginnciambuyersguidethumbnail.png","contentType":"image/png"}}},"title":"The Log Inn CIAM Buyer's Guide","id":"log-inn-ciam-buyers-guide","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T18:52:06.397Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1JfMLqe1MbwivJoyzUsVH8","type":"Asset","createdAt":"2022-08-21T01:29:35.146Z","updatedAt":"2022-09-10T17:59:19.025Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn Guestbook","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1JfMLqe1MbwivJoyzUsVH8/b7767d570597b0885916ceda6b8e3774/loginnguestbookthumbnail.png","details":{"size":755481,"image":{"width":600,"height":856}},"fileName":"loginnguestbookthumbnail.png","contentType":"image/png"}}},"title":"The Log Inn Guestbook","id":"log-inn-guestbook","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T18:52:01.399Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2dnkkXBhIbxxYT1zBhsmkP","type":"Asset","createdAt":"2022-08-21T01:02:48.943Z","updatedAt":"2022-09-10T17:59:53.489Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn Leaky Revenue","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2dnkkXBhIbxxYT1zBhsmkP/3ad25a9484504f7d83e6e279d1f98f46/loginnleakyrevenuethumbnail.png","details":{"size":644078,"image":{"width":600,"height":856}},"fileName":"loginnleakyrevenuethumbnail.png","contentType":"image/png"}}},"title":"The Log Inn Leaky Revenue","id":"log-inn-leaky-revenue","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T18:51:52.923Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6QaoyHUX3Tf7JVGIuMS3fV","type":"Asset","createdAt":"2022-08-19T23:25:00.932Z","updatedAt":"2022-09-10T17:58:47.336Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Expectation vs. Reality at the Log Inn","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6QaoyHUX3Tf7JVGIuMS3fV/36ac3c7049fcfe8616c5843f020fe8ea/expectationvsreality.png","details":{"size":613826,"image":{"width":600,"height":856}},"fileName":"expectationvsreality.png","contentType":"image/png"}}},"title":"Expectation vs Reality at the Log Inn","id":"log-inn-expectation-vs-reality","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T18:51:02.525Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3mSawbeWF4CqKcNxg5q4DK","type":"Asset","createdAt":"2022-08-21T01:16:06.376Z","updatedAt":"2022-09-10T18:06:46.795Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn #NoDistractions","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3mSawbeWF4CqKcNxg5q4DK/1b9d563fe91d7a826a206f3465bd027e/nodistractionsthumbnail.png","details":{"size":787654,"image":{"width":600,"height":856}},"fileName":"nodistractionsthumbnail.png","contentType":"image/png"}}},"title":"The Log Inn #NoDistractions","id":"log-inn-no-distractions","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T17:47:20.892Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4kGE0TBfL95T3PnK1puD2o","type":"Asset","createdAt":"2022-08-18T19:18:05.982Z","updatedAt":"2022-08-18T19:18:05.982Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How CHAOSSEARCH Improved Customer Service and Onboarding","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4kGE0TBfL95T3PnK1puD2o/bbc19400806e15b9bba780210dc0934d/-Google_Docs-_Whitepaper__Letter_size___1_.jpeg","details":{"size":140922,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Whitepaper (Letter size) (1).jpeg","contentType":"image/jpeg"}}},"title":"How CHAOSSEARCH Improved Customer Service and Onboarding","id":"chaossearch-case-study","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T17:33:17.065Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2nfbRyEp0cu2sWwuYWoCyq","type":"Asset","createdAt":"2018-03-06T15:32:56.267Z","updatedAt":"2019-11-06T11:23:53.941Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook The Definitive Guide to SSO","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2nfbRyEp0cu2sWwuYWoCyq/90ad49d4f0cf435d93bb248a54b30b8c/eBook_The_Definitive_Guide_to_SSO.png","details":{"size":80980,"image":{"width":600,"height":856}},"fileName":"eBook_The Definitive Guide to SSO.png","contentType":"image/png"}}},"title":"The Definitive Guide to Single Sign-On","id":"definitive-guide-to-single-sign-on","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T14:49:09.660Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lV9Ips5E4I4bq6hPtvS67","type":"Asset","createdAt":"2022-08-05T21:05:21.139Z","updatedAt":"2022-08-05T21:08:39.239Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Customer Identity Innovation: Journey to Loginless \u0026 Reducing Friction","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lV9Ips5E4I4bq6hPtvS67/17c39bdbe7118001338ec78df304c52a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":90024,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Customer Identity Innovation: Journey to Loginless \u0026 Reducing Friction","id":"customer-identity-innovation-the-journey-to-loginless-and-reducing-friction","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:48:27.133Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1bG3hEhctXNdglGhsROPHj","type":"Asset","createdAt":"2021-06-22T21:19:18.960Z","updatedAt":"2021-06-22T21:51:18.625Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":2,"locale":"en-US"},"fields":{"title":"How Your Login Box Can Build Your Brand","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1bG3hEhctXNdglGhsROPHj/6eacc3c258b14fa7c2f2b535a86a064c/How-login-box-can-build-brand-cover-page-001.jpeg","details":{"size":52219,"image":{"width":600,"height":856}},"fileName":"How-login-box-can-build-brand-cover-page-001.jpeg","contentType":"image/jpeg"}}},"title":"How A Login Box Can Build Your Brand","id":"how-a-login-box-can-build-your-brand","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:48:13.947Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"134H9o3mfVAeBXksuA3Tyr","type":"Asset","createdAt":"2022-07-20T16:14:34.656Z","updatedAt":"2022-07-20T16:14:34.656Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"how-to-choose-your-ciam-solution","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/134H9o3mfVAeBXksuA3Tyr/13aa3d606ed194618422b626ea846347/Page_asset_image.png","details":{"size":278348,"image":{"width":600,"height":856}},"fileName":"Page asset image.png","contentType":"image/png"}}},"title":"How to Choose Your CIAM Solution","id":"ciam-buyers-guide","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:47:59.649Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3IyrhJK7UvErFMwadMW67l","type":"Asset","createdAt":"2022-06-09T23:30:35.442Z","updatedAt":"2022-06-09T23:30:35.442Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How to Better Understand Customers: Identity Insights 101","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3IyrhJK7UvErFMwadMW67l/335be798ca0cddb69afd9e17e9eb1f69/-Landing_Page-_Gated_Content_Identity_Insights_101_WP__625x892px___2_.jpeg","details":{"size":91952,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content_Identity Insights 101 WP (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"title":"How to Better Understand Customers: Identity Insights 101","id":"identity-insights-101","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T14:47:43.913Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6jCtToL9cxPY0DlbdMqtFL","type":"Asset","createdAt":"2022-06-17T15:53:48.852Z","updatedAt":"2022-06-17T16:03:21.026Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 Kickstart Workshop: South East Asia Edition","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6jCtToL9cxPY0DlbdMqtFL/98cb554f82e7640a36f1396e0a6eff68/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":161075,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Auth0 Kickstart Workshop: South East Asia Edition","id":"kickstart-workshop-south-east-asia-edition","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T14:47:27.499Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"42P6k7kBzMzY0sdWoHS05l","type":"Asset","createdAt":"2022-06-16T18:48:34.875Z","updatedAt":"2022-06-16T18:48:34.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Proofing with Auth0 Partner Integrations","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/42P6k7kBzMzY0sdWoHS05l/9ba4c35e1096d9def2aaca7d7579213c/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":89296,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Identity Proofing with Auth0 Partner Integrations","id":"identity-proofing-partner-integrations-webinar","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:47:13.093Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"460ILZCPJCyHAIQa63IK4w","type":"Asset","createdAt":"2022-06-03T01:23:13.600Z","updatedAt":"2022-06-03T01:23:13.600Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/460ILZCPJCyHAIQa63IK4w/3dc52ea9938df4b770662a8874558c52/Whitepaper_Cover_A4__8_.jpeg","details":{"size":165123,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (8).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","id":"uk-public-sector-ciam-infographic","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:46:55.077Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4v1MOhfIzaIu0ssrtzeUS5","type":"Asset","createdAt":"2022-06-03T01:17:07.164Z","updatedAt":"2022-06-03T01:17:07.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4v1MOhfIzaIu0ssrtzeUS5/00757a1c56c69126be74c92ab42b7bf1/Whitepaper_Cover_A4__7_.jpeg","details":{"size":122339,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (7).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","id":"anz-public-sector-ciam-infographic","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:46:41.387Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5YuUD1CIZ2rX0eIgLs1HHy","type":"Asset","createdAt":"2022-06-03T00:55:37.558Z","updatedAt":"2022-06-03T00:55:37.558Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5YuUD1CIZ2rX0eIgLs1HHy/16f412a127ddb8818f3fff1bf259e6d4/Whitepaper_Cover_A4__6_.jpeg","details":{"size":116680,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (6).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","id":"us-public-sector-ciam-infographic","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:46:22.999Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6iI2gwTehORrAhLq3sMx9I","type":"Asset","createdAt":"2022-06-02T19:04:41.794Z","updatedAt":"2022-06-02T19:04:41.794Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector - CIAM in the United States","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6iI2gwTehORrAhLq3sMx9I/661090b4eac2e575d27f7939a871c968/Whitepaper_Cover_A4__5_.jpeg","details":{"size":108010,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (5).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector - CIAM in the United States","id":"us-public-sector-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:46:03.471Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"66AIBPZ3kVNTiDeRFZRaSH","type":"Asset","createdAt":"2022-06-02T18:54:48.875Z","updatedAt":"2022-06-02T18:54:48.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector - CIAM in the United Kingdom","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/66AIBPZ3kVNTiDeRFZRaSH/b58b4c7d44ba466a5e3bc4d4fa32166e/Whitepaper_Cover_A4__4_.jpeg","details":{"size":157130,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (4).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector - CIAM in the United Kingdom","id":"uk-public-sector-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:45:40.598Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3JSxqcKKdVbbFagywc32fQ","type":"Asset","createdAt":"2022-06-02T15:02:14.394Z","updatedAt":"2022-06-02T18:00:25.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":2,"locale":"en-US"},"fields":{"title":"Public Sector - CIAM in Australia and New Zealand","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3JSxqcKKdVbbFagywc32fQ/9cfb2d240d5b07b2272c2bb913a7cac2/Whitepaper_Cover_A4__3_.jpeg","details":{"size":112724,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (3).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector - CIAM in Australia and New Zealand","id":"anz-public-sector-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:44:59.930Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3l09aAYoQ8JObAzwPTLDXY","type":"Asset","createdAt":"2022-05-11T22:35:53.987Z","updatedAt":"2022-05-11T22:35:53.987Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Secure, Frictionless Customer Identity and Access Management","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3l09aAYoQ8JObAzwPTLDXY/4e18390a92a18240b916b73df52e83f3/_Security__Whitepaper_Cover_A4__1_.jpeg","details":{"size":102761,"image":{"width":600,"height":856}},"fileName":"(Security)_Whitepaper_Cover_A4 (1).jpeg","contentType":"image/jpeg"}}},"title":"Public Sector: Secure, Frictionless Customer Identity and Access Management","id":"pubsec-secure-frictionless-ciam","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:44:17.981Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vIluZLzSXEq8d9OjUyWIo","type":"Asset","createdAt":"2022-01-10T17:08:27.733Z","updatedAt":"2022-01-10T17:48:09.044Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 Integration with Singpass","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6vIluZLzSXEq8d9OjUyWIo/737d80c62cc9524985c24d6be9d49a1e/-Google_Docs-_Whitepaper__Letter_size_.jpeg","details":{"size":138387,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Whitepaper (Letter size).jpeg","contentType":"image/jpeg"}}},"title":"Singpass and Auth0 Integration: Enable Singpass Login with a QR Code","id":"singpass-101","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:43:49.158Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1pdlP1HobarBZ6T6e6M5Ej","type":"Asset","createdAt":"2022-04-27T22:37:48.639Z","updatedAt":"2022-04-27T22:37:48.639Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Security for Web Developers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1pdlP1HobarBZ6T6e6M5Ej/d4dcf5001cc1f88f11054e50d4cddfb9/-Landing_Page-_Security_for_Web_Developers.jpeg","details":{"size":100093,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Security for Web Developers.jpeg","contentType":"image/jpeg"}}},"title":"Security for Web Developers","id":"security-for-web-developers","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-10T14:43:32.037Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2UL1hTH5xoqnDhS3oi5QXa","type":"Asset","createdAt":"2022-05-11T23:14:39.765Z","updatedAt":"2022-05-11T23:14:39.765Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Secure, Frictionless CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2UL1hTH5xoqnDhS3oi5QXa/6060ba9f981309f1f630508914fe6064/Whitepaper_Cover_A4__1_.jpeg","details":{"size":69379,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (1).jpeg","contentType":"image/jpeg"}}},"title":"Infographic: Secure, Frictionless CIAM","id":"pubsec-secure-frictionless-ciam-infographic","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:43:11.784Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1a8Wej31WaCWZmrp2yKBdM","type":"Asset","createdAt":"2022-05-10T18:52:20.581Z","updatedAt":"2022-05-10T18:52:20.581Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Identity Platform: Private Cloud Deployment ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1a8Wej31WaCWZmrp2yKBdM/83c8e2f3d903c780fded02234572761f/Whitepaper_Cover_A4.jpeg","details":{"size":130646,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4.jpeg","contentType":"image/jpeg"}}},"title":"Auth0 Identity Platform: Private Cloud Deployment","id":"private-cloud-deployment","language":"EN"},{"type":"webinars","updatedAt":"2022-09-10T14:42:47.190Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7tmc2BOoqEeWfCXkX8SP31","type":"Asset","createdAt":"2022-04-07T00:09:40.142Z","updatedAt":"2022-04-07T00:09:40.142Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"The Journey to Loginless. First Step, Passwordless.","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7tmc2BOoqEeWfCXkX8SP31/607c505e85bd098fb3cb214fe854dd33/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":97000,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"The Journey to Loginless. First Step, Passwordless.","id":"on-demand-passwordless-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-10T14:34:03.935Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"49Ug6cu7y0m2uGqwYaOc2e","type":"Asset","createdAt":"2018-03-06T15:32:30.465Z","updatedAt":"2019-11-06T11:24:18.418Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepapers Whats is your digital DNA","file":{"url":"//images.ctfassets.net/2ntc334xpx65/49Ug6cu7y0m2uGqwYaOc2e/6652e1c9e15229a575c0bba69f41d1c4/Whitepapers_Whats_is_your_digital_DNA.png","details":{"size":550155,"image":{"width":600,"height":856}},"fileName":"Whitepapers_Whats is your digital DNA.png","contentType":"image/png"}}},"title":"What is Your Digital DNA?","id":"forrester-digital-transformation-playbook","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:03.638Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5DE8eyvHYxUZYmaxQXtPKT","type":"Asset","createdAt":"2022-04-06T21:25:15.040Z","updatedAt":"2022-04-07T14:01:57.528Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Why Authentication is the Key to Securing the Digital Front Door of Government","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5DE8eyvHYxUZYmaxQXtPKT/83158580cec30f4591035ada7233a761/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":170616,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Why Authentication is the Key to Securing the Digital Front Door of Government","id":"why-authentication-is-the-key-to-securing-the-digital-front-door-of-government","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:13:03.368Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"oEClOoc2MsIVXjswfVROI","type":"Asset","createdAt":"2022-03-31T00:12:44.159Z","updatedAt":"2022-03-31T00:15:21.109Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"The Future of Authentication for Employees and Customers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/oEClOoc2MsIVXjswfVROI/39dd160e933a483a86b26518c28d0711/-Google_Docs-_Future_of_Authentication_hi.jpeg","details":{"size":141334,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Future of Authentication hi.jpeg","contentType":"image/jpeg"}}},"title":"The Future of Authentication for Employees and Customers","id":"the-future-of-authentication-with-jameeka","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:03.084Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2aY0ROs0RzGjfkDHatf0Um","type":"Asset","createdAt":"2022-03-23T23:24:32.141Z","updatedAt":"2022-03-23T23:28:13.536Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"CIAM Conversion and Retention","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2aY0ROs0RzGjfkDHatf0Um/968f39703c98e5fe6400eb53d93a2435/-Landing_Page-_Gated_Content__any___625x892px___2_.jpeg","details":{"size":175646,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"title":"Building on Identity: How Can Customer Identity Management Drive Conversion and Retention?","id":"CIAM-conversion-retention","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:13:02.746Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ERvqf6PpBac2jTLWUM7mz","type":"Asset","createdAt":"2022-03-23T15:23:48.922Z","updatedAt":"2022-03-23T15:26:12.919Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Understand Evolving Data Privacy for CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ERvqf6PpBac2jTLWUM7mz/6c563278d6393e487b0fb9e3195436d1/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":87253,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Understand Evolving Data Privacy for CIAM","id":"understanding-data-privacy-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:02.405Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2NB9GeTNOLDau4pa7VqUi2","type":"Asset","createdAt":"2022-03-16T23:45:39.163Z","updatedAt":"2022-03-16T23:58:31.900Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"Case Study: Secure Access for Every.org","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2NB9GeTNOLDau4pa7VqUi2/f60f5e76c18d81e6401cd8a1758afb33/Untitled_design__1_.jpg","details":{"size":63959,"image":{"width":600,"height":856}},"fileName":"Untitled design (1).jpg","contentType":"image/jpeg"}}},"title":"Case Study: Secure Access for Every.org","id":"case-study-everydotorg","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:02.100Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"wxaszFpRqCldlUTrxkJtI","type":"Asset","createdAt":"2022-03-10T18:41:25.526Z","updatedAt":"2022-03-10T18:41:25.526Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How the LATAM market is driving fintech innovation","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/wxaszFpRqCldlUTrxkJtI/93180ab0a0c957a8f302a26a15d8eedc/-Landing_Page-_Gated_Content__any___625x892px___1___1_.jpeg","details":{"size":144864,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (1) (1).jpeg","contentType":"image/jpeg"}}},"title":"How the LATAM market is driving fintech innovation","id":"how-latam-is-driving-fintech-innovation","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:01.656Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4grG6ZRuRleJ3AaDj27tSh","type":"Asset","createdAt":"2022-02-23T22:38:55.117Z","updatedAt":"2022-02-23T22:40:06.668Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"locale":"en-US"},"fields":{"title":"SIO Personal Cybersecurity Checklist","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4grG6ZRuRleJ3AaDj27tSh/9baa17d86a773098202f97c7e1fd1197/SIO-Cybersecurity-Checklist---Home.jpg","details":{"size":120103,"image":{"width":600,"height":856}},"fileName":"SIO-Cybersecurity-Checklist---Home.jpg","contentType":"image/jpeg"}}},"title":"Your Personal Cybersecurity Checklist - Home Edition by Auth0.org","id":"personal-cybersecurity-checklist-auth0dotorg","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:01.151Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4wt2F0rbl479kfa8OXVw6v","type":"Asset","createdAt":"2022-02-23T22:46:08.659Z","updatedAt":"2022-02-23T22:46:35.060Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Workplace edition","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4wt2F0rbl479kfa8OXVw6v/055180d6fb7192f1ddbc601b48c8285d/SIO-Cybersecurity-Checklist---Workplace.jpg","details":{"size":69662,"image":{"width":600,"height":856}},"fileName":"SIO-Cybersecurity-Checklist---Workplace.jpg","contentType":"image/jpeg"}}},"title":"Your Personal Cybersecurity Checklist - Workplace Edition by Auth0.org","id":"personal-cybersecurity-checklist-workplace-auth0dotorg","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:00.864Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3StK6BCIbcbcFBBUc8ja67","type":"Asset","createdAt":"2022-02-16T17:42:04.397Z","updatedAt":"2022-03-04T17:24:03.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":7,"locale":"en-US"},"fields":{"title":"Gartner CIAM Report Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3StK6BCIbcbcFBBUc8ja67/eecdd64ac0ec89d1173dd2cf4c94778b/900-pixels.png","details":{"size":145403,"image":{"width":600,"height":856}},"fileName":"900-pixels.png","contentType":"image/png"}}},"title":"Gartner® Report: Managing External Identities Using a CIAM Tool, Nov 2021","id":"gartner-managing-external-identities-using-ciam-tool","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:00.454Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6mq02b0B4zttSWcH3FlurA","type":"Asset","createdAt":"2021-08-23T22:09:27.132Z","updatedAt":"2022-02-08T20:01:36.100Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":4,"locale":"en-US"},"fields":{"title":"Build vs Buy for Public Sector: A Government Guide to CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6mq02b0B4zttSWcH3FlurA/9045937af9493df145d70706e86f9981/_Security__Whitepaper_Cover_A4.jpeg","details":{"size":102164,"image":{"width":600,"height":856}},"fileName":"(Security)_Whitepaper_Cover_A4.jpeg","contentType":"image/jpeg"}}},"title":"Build vs. Buy for Public Sector: A Government Guide to CIAM ","id":"building-on-a-buyable-ciam-solution","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:13:00.152Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6mOtEAmOeTrR3JH1ZyBosB","type":"Asset","createdAt":"2022-02-02T09:16:44.449Z","updatedAt":"2022-02-02T10:43:10.568Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"IDG CIAM 2022 - EN","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6mOtEAmOeTrR3JH1ZyBosB/5e1f43cc2ce555c5f562f1b5bc57996b/IDG_CIAM_2022_-_EN.png","details":{"size":223815,"image":{"width":600,"height":856}},"fileName":"IDG CIAM 2022 - EN.png","contentType":"image/png"}}},"title":"IDG (C)IAM 2022 Study","id":"idg-ciam-study-2022-en","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:59.859Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5pCddbL4kedY1HUyv5Tqwe","type":"Asset","createdAt":"2022-02-01T23:13:23.479Z","updatedAt":"2022-02-01T23:13:23.479Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5pCddbL4kedY1HUyv5Tqwe/788b113e71ac564246cf4fa24a4a9c79/Fauna___Netlify_eBook_Share_Asset_V2.jpg","details":{"size":89369,"image":{"width":600,"height":856}},"fileName":"Fauna + Netlify eBook Share Asset V2.jpg","contentType":"image/jpeg"}}},"title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","id":"building-a-secure-e-diary","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:59.394Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3tVgaPrpNJDMYEG6uB3xFQ","type":"Asset","createdAt":"2022-01-20T10:05:30.953Z","updatedAt":"2022-01-20T10:41:35.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"Secure Digital Authentication with Identity Proofing","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3tVgaPrpNJDMYEG6uB3xFQ/f526bb10d7d3ce7005f5db2c6e3abf79/Secure_Digital_Authentication_with_Identity_Proofing_-_Cover.png","details":{"size":369701,"image":{"width":600,"height":856}},"fileName":"Secure Digital Authentication with Identity Proofing - Cover.png","contentType":"image/png"}}},"title":"Secure Digital Authentication with Identity Proofing","id":"secure-digital-authentication-id-proofing","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:58.749Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7mA5EOgBojaa3p4y1Opt2l","type":"Asset","createdAt":"2022-01-18T16:58:08.871Z","updatedAt":"2022-01-18T16:59:10.987Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Elevate trusted digital identity solutions through eIDs","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7mA5EOgBojaa3p4y1Opt2l/4c640c1f39de941f7d367590174c2a4c/Elevate_trusted_digital_identity_solutions_through_eIDs_-_Cover.jpeg","details":{"size":103508,"image":{"width":600,"height":856}},"fileName":"Elevate trusted digital identity solutions through eIDs - Cover.jpeg","contentType":"image/jpeg"}}},"title":"Elevate trusted digital identity solutions through eIDs","id":"trusted-identity-solutions-eids","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:58.463Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6GLqD0ptJe4wp3ZvF1dwMt","type":"Asset","createdAt":"2022-01-10T22:11:17.147Z","updatedAt":"2022-01-10T22:13:04.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Cover Image US Report","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6GLqD0ptJe4wp3ZvF1dwMt/b20bd8b53a717c52bc5e9d10af22add2/-Landing_Page-_Gated_Content___Logo__625x892px__US_Report.jpeg","details":{"size":147940,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content + Logo (625x892px)_US Report.jpeg","contentType":"image/jpeg"}}},"title":"2022 Public Sector Identity Index Report - US","id":"us-public-sector-identity-index-report-2022","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:58.108Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"GS2d8kp1JGL0EmiGsdpj5","type":"Asset","createdAt":"2022-01-10T19:20:04.218Z","updatedAt":"2022-01-10T21:19:43.402Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"2022-Public-Sector-Identity-Index-Global-Report(625x892px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/GS2d8kp1JGL0EmiGsdpj5/b4bce4c52df8022e54e56d68ede8c0be/2022-Public-Sector-Identity-Index-Global-Report_625x892px_.jpeg","details":{"size":148656,"image":{"width":600,"height":856}},"fileName":"2022-Public-Sector-Identity-Index-Global-Report(625x892px).jpeg","contentType":"image/jpeg"}}},"title":"2022 Public Sector Identity Index Report - Global","id":"global-public-sector-identity-index-report-2022","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:57.806Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3jxDrYXebf6vJcskO2ha1G","type":"Asset","createdAt":"2022-01-10T21:55:59.470Z","updatedAt":"2022-01-10T21:56:59.385Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"UK Report Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3jxDrYXebf6vJcskO2ha1G/1fbdb8a4d353c920b233e798894d88ca/-Landing_Page-_Gated_Content___Logo__625x892px__UK_Report.jpeg","details":{"size":147871,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content + Logo (625x892px)_UK Report.jpeg","contentType":"image/jpeg"}}},"title":"2022 Public Sector Identity Index Report - UK","id":"uk-public-sector-identity-index-report-2022","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:57.252Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7I5IbGKFCeDIhTXJQ7s6X0","type":"Asset","createdAt":"2022-01-10T22:22:16.851Z","updatedAt":"2022-01-10T22:22:16.851Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"-Landing Page- Gated Content + Logo (625x892px) ANZ Report","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7I5IbGKFCeDIhTXJQ7s6X0/0ce18d52b3955d12f662e171e0232429/-Landing_Page-_Gated_Content___Logo__625x892px__ANZ_Report.jpeg","details":{"size":147796,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content + Logo (625x892px)_ANZ Report.jpeg","contentType":"image/jpeg"}}},"title":"2022 Public Sector Identity Index Report - Australia \u0026 New Zealand","id":"anz-public-sector-identity-index-report-2022","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:56.975Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5LAwTpa9DdqVlGXcFPmo8b","type":"Asset","createdAt":"2021-12-01T15:36:26.586Z","updatedAt":"2021-12-01T15:37:51.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 and AWS: Securing modern, multi-SaaS applications","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5LAwTpa9DdqVlGXcFPmo8b/59ff1e24f72afe744f14680118c5feaf/Auth0_and_AWS_Immersion_Day_-_Securing_modern__multi-SaaS_applications__Thumbnail_.jpeg","details":{"size":107443,"image":{"width":600,"height":856}},"fileName":"Auth0 and AWS Immersion Day - Securing modern, multi-SaaS applications (Thumbnail).jpeg","contentType":"image/jpeg"}}},"title":"Auth0 and AWS Immersion Day: Securing modern, multi-SaaS applications","id":"aws-securing-modern-multi-saas-applications","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:56.694Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"vJSnSMdmfGS8IbrOWHrk4","type":"Asset","createdAt":"2021-12-13T22:20:30.382Z","updatedAt":"2021-12-13T22:20:30.382Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: State of Healthcare’s Digital Front Door","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/vJSnSMdmfGS8IbrOWHrk4/c98d5c8e4a5de5eb4665f386d116e4ef/DFD_Infographic_Cover_LP.jpeg","details":{"size":90140,"image":{"width":600,"height":856}},"fileName":"DFD Infographic Cover_LP.jpeg","contentType":"image/jpeg"}}},"title":"Infographic: State of Healthcare’s Digital Front Door","id":"state-of-healthcare-digital-front-door-infographic","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:56.316Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"25JQyqRLKD4xcgX8gddr1M","type":"Asset","createdAt":"2021-12-10T22:36:35.297Z","updatedAt":"2021-12-10T22:36:35.297Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Why Build When You Can Buy: A Fireside Chat with YourStory","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/25JQyqRLKD4xcgX8gddr1M/d96cd781174a3f2ac885cff9060919cc/-Landing_Page-_Gated_Content__any___625x892px___6_.jpeg","details":{"size":103488,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (6).jpeg","contentType":"image/jpeg"}}},"title":"Why Build When You Can Buy: A Fireside Chat with YourStory","id":"fireside-chat-with-your-story","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:55.937Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6GhFWQMeMGfwGyev2gZtkf","type":"Asset","createdAt":"2021-12-09T00:09:50.485Z","updatedAt":"2021-12-09T00:09:50.485Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication After Passwords","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6GhFWQMeMGfwGyev2gZtkf/918ecffc22566bea647de34e61bb8f74/Screen_Shot_2021-12-08_at_4.01.12_PM.png","details":{"size":152589,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-12-08 at 4.01.12 PM.png","contentType":"image/png"}}},"title":"Authentication After Passwords","id":"authentication-after-passwords","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:55.563Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7FeRHzamWOhoGZg6nx6DFq","type":"Asset","createdAt":"2021-12-02T21:21:25.000Z","updatedAt":"2021-12-02T21:21:25.000Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Checklist: Are You Ready for the Digital Front Door?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7FeRHzamWOhoGZg6nx6DFq/4336ea49bc479f31b76ed77ea5d90d55/-Landing_Page-_Gated_Content__any___625x892px___5_.jpeg","details":{"size":89115,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (5).jpeg","contentType":"image/jpeg"}}},"title":"Checklist: Are You Ready for the Digital Front Door?","id":"checklist-digital-front-door","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:54.341Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2q2lLkA1WwycuQqcCOqeOc","type":"Asset","createdAt":"2018-12-17T19:24:18.016Z","updatedAt":"2019-11-06T11:21:11.215Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 for Consumer-Facing Applications@1x","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2q2lLkA1WwycuQqcCOqeOc/84ac7b1e9dfe65d56986bb46f28b18d6/Auth0_for_Consumer-Facing_Applications_1x.png","details":{"size":503953,"image":{"width":600,"height":856}},"fileName":"Auth0 for Consumer-Facing Applications@1x.png","contentType":"image/png"}}},"title":"Auth0 for Consumer-Facing Applications","id":"demo-consumer-facing-applications","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:52.719Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6MSqRZ2h5oMXqeT1awqdIk","type":"Asset","createdAt":"2019-08-23T20:30:32.997Z","updatedAt":"2019-11-06T11:20:40.697Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":2,"locale":"en-US"},"fields":{"title":"Top Trends and Themes Shaping the IAM Market Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6MSqRZ2h5oMXqeT1awqdIk/b61cd4d0339849edd8eb1c434d84cdc4/Top_Trends_and_Themes_Shaping_the_IAM_Market_2x__1_.png","details":{"size":93496,"image":{"width":600,"height":856}},"fileName":"Top Trends and Themes Shaping the IAM Market@2x (1).png","contentType":"image/png"}}},"title":"Top Trends and Themes Shaping the IAM Market","id":"top-trends-and-themes-shaping-the-iam-market","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:52.428Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3YTaejHnYo7RsTmjnHS6sR","type":"Asset","createdAt":"2019-05-01T13:32:18.936Z","updatedAt":"2019-11-06T11:20:57.996Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Modern Authentication Demystified CP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3YTaejHnYo7RsTmjnHS6sR/951f557463031b57310981d6275d7095/Modern_Authentication_Demystified_CP.png","details":{"size":321037,"image":{"width":600,"height":856}},"fileName":"Modern Authentication Demystified CP.png","contentType":"image/png"}}},"title":"Modern Authentication Demystified","id":"modern-authentication-demystified","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:51.814Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"52c36VNVkHIxYGZQaTGWl2","type":"Asset","createdAt":"2019-08-27T18:56:08.633Z","updatedAt":"2019-11-06T11:20:39.949Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":2,"locale":"en-US"},"fields":{"title":"KuppingerCole Report-Whitepaper","file":{"url":"//images.ctfassets.net/2ntc334xpx65/52c36VNVkHIxYGZQaTGWl2/6acf4c5ca37b7d6a3735f7e8f4745eff/20190826_web_cover_KuppingerCole_Report-Whitepaper_FerCozzi_v2-01.png","details":{"size":53458,"image":{"width":600,"height":856}},"fileName":"20190826_web cover_KuppingerCole Report-Whitepaper_FerCozzi_v2-01.png","contentType":"image/png"}}},"title":"Do Identity Right – So Your Digital Business Strategy Succeeds","id":"identity-digital-business-strategy","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:48.641Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"281R7DFu2bKIx8LdRo5k4V","type":"Asset","createdAt":"2021-11-17T23:07:46.813Z","updatedAt":"2021-11-17T23:07:46.813Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Identity in Southeast Asia with NTUC","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/281R7DFu2bKIx8LdRo5k4V/94f6e72730c115769bffdccb8a81fa93/-Landing_Page-_Gated_Content__any___625x892px___1_.jpeg","details":{"size":90681,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (1).jpeg","contentType":"image/jpeg"}}},"title":"Identity in Southeast Asia with NTUC","id":"identity-in-southeast-asia-with-ntuc","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:48.330Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4X9pLe8KEmjlw6vrbHRK2e","type":"Asset","createdAt":"2021-11-11T20:13:04.163Z","updatedAt":"2021-11-11T20:13:04.163Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 on Azure Webinar 2021 (600 x 856 px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4X9pLe8KEmjlw6vrbHRK2e/4c4e87434ae7b54ceb3582e886977f40/Auth0_on_Azure_Webinar_2021__600_x_856_px___1_.png","details":{"size":432852,"image":{"width":600,"height":856}},"fileName":"Auth0 on Azure Webinar 2021 (600 x 856 px) (1).png","contentType":"image/png"}}},"title":"Auth0 Identity Platform on Azure","id":"identity-platform-azure-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:48.075Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4O3DbQZOhI9lxMTsel8hGG","type":"Asset","createdAt":"2021-11-10T23:44:59.219Z","updatedAt":"2021-11-10T23:44:59.219Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Best Practices Guide for SMART on FHIR","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4O3DbQZOhI9lxMTsel8hGG/a59dd0dd67636d76c9181df938cbb17b/_Landing_Page__Gated_Content__any___625x892px___2___1_.jpeg","details":{"size":85357,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (2) (1).jpeg","contentType":"image/jpeg"}}},"title":"Best Practices Guide for SMART on FHIR","id":"best-practices-guide-for-smart-on-fhir","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:47.701Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"95La5ykTE3ocdCWUyNAWn","type":"Asset","createdAt":"2021-11-08T23:19:55.590Z","updatedAt":"2021-11-08T23:19:55.590Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Digital Identity Across Government \u0026 The Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/95La5ykTE3ocdCWUyNAWn/187a17e0d890133ae9b5f72e773e7501/_Landing_Page__Gated_Content___Logo__625x892px___3_.jpeg","details":{"size":152291,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content + Logo (625x892px) (3).jpeg","contentType":"image/jpeg"}}},"title":"The Future of Digital Identity Across Government \u0026 The Public Sector","id":"the-future-of-digitial-identity-gov-pub-sec","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:47.431Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1MzurDy4z1ZHOsE6wT0Oyn","type":"Asset","createdAt":"2021-11-08T22:47:22.171Z","updatedAt":"2021-11-08T23:03:52.631Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"Opening the Door to Interoperability in Healthcare","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1MzurDy4z1ZHOsE6wT0Oyn/f24226f399cd1a272894a0a38f44d8a1/Screen_Shot_2021-11-08_at_3.03.11_PM.png","details":{"size":389706,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-11-08 at 3.03.11 PM.png","contentType":"image/png"}}},"title":"Opening the Door to Interoperability in Healthcare","id":"interoperability-in-healthcare","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:47.166Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3lIQTf2SvO9Rc1OZZ3jI9h","type":"Asset","createdAt":"2021-11-05T00:44:23.876Z","updatedAt":"2021-11-05T00:44:23.876Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Identity w NIB (Cover v2)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3lIQTf2SvO9Rc1OZZ3jI9h/370991f3d2026eddbe87ff4fa83072a4/Identity_w_NIB_Cover_600_856.png","details":{"size":297702,"image":{"width":600,"height":856}},"fileName":"Identity_w_NIB_Cover_600_856.png","contentType":"image/png"}}},"title":"Identity with NIB Group","id":"identity-with-nib","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:46.601Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3s8KHdzCK0mEASH1yDzj7o","type":"Asset","createdAt":"2021-09-29T18:33:49.450Z","updatedAt":"2021-09-29T18:33:49.450Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Is Digital Identity Management a Distraction?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3s8KHdzCK0mEASH1yDzj7o/5da30ba3705d048106fe6b8862050533/_Landing_Page__Gated_Content__any___625x892px___1_.jpeg","details":{"size":153960,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (1).jpeg","contentType":"image/jpeg"}}},"title":"Is Digital Identity Management a Distraction?","id":"is-digital-identity-management-a-distraction","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:46.292Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6i7iZGUruXVLUZV6qE11Y9","type":"Asset","createdAt":"2021-10-26T20:22:07.444Z","updatedAt":"2021-10-26T20:22:07.444Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"Demo: Auth0 CIAM on AWS for Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6i7iZGUruXVLUZV6qE11Y9/6610f7c807e607f42c2ae3999d7d1767/Auth0_CIAM_on_AWS_for_Public_Sector.jpeg","details":{"size":133733,"image":{"width":600,"height":856}},"fileName":"Auth0 CIAM on AWS for Public Sector.jpeg","contentType":"image/jpeg"}}},"title":"Demo: Auth0 CIAM on AWS for Public Sector","id":"demo-auth0-ciam-on-aws-for-public-sector","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:45.942Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HqHQuldSfu3Dca0MH0eVK","type":"Asset","createdAt":"2021-10-11T23:35:25.675Z","updatedAt":"2021-10-11T23:35:25.675Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"7 Things Healthcare Organizations Need to Know About Passwordless Authentication","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HqHQuldSfu3Dca0MH0eVK/276f1de26b8ec7abc795108f3e3469ba/Passwordless_healthcare_LP_cover__625x892px_.jpeg","details":{"size":173366,"image":{"width":600,"height":856}},"fileName":"Passwordless healthcare LP cover (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"7 Things Healthcare Orgs Need to Know About Passwordless Auth.","id":"passwordless-healthcare-wp","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:45.613Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"64AWLqTI7079OHIOF95nMh","type":"Asset","createdAt":"2021-10-08T22:08:10.395Z","updatedAt":"2021-10-08T22:34:18.414Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Unlock long-term growth with Auth0 Identity Platform on Azure","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/64AWLqTI7079OHIOF95nMh/e010c420126b665c980305c9145ef01c/Auth0-Whitepaper-Azure-One-Pager-Preview.jpeg","details":{"size":55980,"image":{"width":600,"height":856}},"fileName":"Auth0-Whitepaper-Azure-One-Pager-Preview.jpeg","contentType":"image/jpeg"}}},"title":"Unlock long-term growth with Auth0 Identity Platform on Azure","id":"unlock-long-term-growth-with-auth0-identity-platform-on-azure","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:44.951Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1tA41Kmr2ZA5buYUXGW95b","type":"Asset","createdAt":"2021-09-29T15:48:42.768Z","updatedAt":"2021-10-20T09:09:45.207Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":4,"locale":"en-US"},"fields":{"title":"CIAM for Dummies","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1tA41Kmr2ZA5buYUXGW95b/237c6bb7fb85176bb5e76df5d52ee5a7/Okta_CIAM_Auth0_WH200_UK.png","details":{"size":179042,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_UK.png","contentType":"image/png"}}},"title":"Customer Identity \u0026 Access Management For Dummies","id":"ciam-for-dummies","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:44.656Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"71b4geBxjNbxuUmlG6g2Mb","type":"Asset","createdAt":"2021-09-23T14:53:47.889Z","updatedAt":"2021-09-23T14:53:47.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS for Dummies Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/71b4geBxjNbxuUmlG6g2Mb/37b649c75f1ea650803543d2ad9d584e/Okta_IDaaS_Auth0_WH200_UK.png","details":{"size":174740,"image":{"width":600,"height":856}},"fileName":"Okta_IDaaS_Auth0_WH200_UK.png","contentType":"image/png"}}},"title":"Identity as a Service for Dummies","id":"identity-as-a-service-for-dummies","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:44.404Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xmf20w6ZAadjEHHvL6OnM","type":"Asset","createdAt":"2021-08-06T17:40:08.356Z","updatedAt":"2021-08-06T17:40:08.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Using Location Behavior to Enhance Mobile App Authentication","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xmf20w6ZAadjEHHvL6OnM/ec35285c111b64fbe63bd3ba3cce95f6/Incognia_and_Auth0_Webinar_Share_Asset.jpg","details":{"size":108137,"image":{"width":600,"height":856}},"fileName":"Incognia and Auth0 Webinar Share Asset.jpg","contentType":"image/jpeg"}}},"title":"Using Location Behavior to Enhance Mobile App Authentication","id":"incognia-auth0-location-behavior-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:44.121Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6kqwOwUsO18tN6hJuGYBZC","type":"Asset","createdAt":"2021-08-02T22:07:53.213Z","updatedAt":"2021-08-02T22:07:53.213Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"LGPD — Preparing for Brazil’s Data Protection Law","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6kqwOwUsO18tN6hJuGYBZC/e66569ed6b9e958ce36a1e075259a68c/Landing_Page_Cover___LGPD_whitepaper.jpeg","details":{"size":85725,"image":{"width":600,"height":856}},"fileName":"Landing Page Cover _ LGPD whitepaper.jpeg","contentType":"image/jpeg"}}},"title":"LGPD — Preparing for Brazil’s Data Protection Law","id":"lgpd-brazil-data-protection","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:43.811Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2Pu8bMVZUaGMB5gaqUdDQX","type":"Asset","createdAt":"2021-07-21T22:42:16.171Z","updatedAt":"2021-07-21T22:42:16.171Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How Identity Forms a Foundation for Digital Government","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2Pu8bMVZUaGMB5gaqUdDQX/98bab5cae8d67dea58d7be7178f9b751/_Landing_Page__GC___Government_CIAM.jpeg","details":{"size":89997,"image":{"width":600,"height":856}},"fileName":"[Landing Page] GC _ Government CIAM.jpeg","contentType":"image/jpeg"}}},"title":"How Identity Forms a Foundation for Digital Government","id":"how-identity-forms-a-foundation-for-digital-govenrment","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:43.520Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2eCtHvNAbwVoCZouZkuqxW","type":"Asset","createdAt":"2021-07-21T16:52:34.353Z","updatedAt":"2021-07-21T16:52:34.353Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How Identity Management Drives Cloud Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2eCtHvNAbwVoCZouZkuqxW/42e8fd4a70abd73c872eb5971d145d02/Auth0-Resource_Cover-AWS-GC.png","details":{"size":355620,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-AWS-GC.png","contentType":"image/png"}}},"title":"How Identity Management Drives Cloud Innovation","id":"how-identity-management-drives-cloud-innovation","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:43.209Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3NmZtNbG3f1QypWsbWibxM","type":"Asset","createdAt":"2021-06-24T22:49:29.865Z","updatedAt":"2021-06-28T20:52:24.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Infographic: Top 3 Attacks That Threaten Identity Security","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3NmZtNbG3f1QypWsbWibxM/89d3e91be99b0c749dbccfa7f3cb5105/Identity_Security_Infographic_-_Landing_Page__Updated_.jpeg","details":{"size":85802,"image":{"width":600,"height":856}},"fileName":"Identity Security Infographic - Landing Page (Updated).jpeg","contentType":"image/jpeg"}}},"title":"Infographic: Top 3 Attacks That Threaten Identity Security","id":"top-3-attacks-that-threaten-identity-security-infographic","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.891Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1gIu5V3oy7eRJXJmfOTJGQ","type":"Asset","createdAt":"2021-06-16T16:09:31.997Z","updatedAt":"2021-06-25T16:00:34.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Auth0 + AWS Immersion Day Workshop","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1gIu5V3oy7eRJXJmfOTJGQ/e6cfb39beb56576413f015ced7435eb2/Landing_Page_AWS_Immersion_Day_Workshop.jpeg","details":{"size":153505,"image":{"width":600,"height":856}},"fileName":"Landing Page_AWS Immersion Day Workshop.jpeg","contentType":"image/jpeg"}}},"title":"AWS + Auth0 Immersion Day Webinar","id":"aws-auth0-immersion-day-webinar","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.620Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"YAhdJST63DclbBFvRqh6O","type":"Asset","createdAt":"2021-07-01T23:05:50.623Z","updatedAt":"2021-07-01T23:05:50.623Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Live Demo: Auth0 Passwordless with WebAuthn","file":{"url":"//images.ctfassets.net/2ntc334xpx65/YAhdJST63DclbBFvRqh6O/eb4005205152bc03a0bc81a49ba3a8eb/CoverImageAuth0Passwordless.jpeg","details":{"size":81913,"image":{"width":600,"height":856}},"fileName":"CoverImageAuth0Passwordless.jpeg","contentType":"image/jpeg"}}},"title":"Live Demo: Auth0 Passwordless with WebAuthn","id":"live-demo-passwordless","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.263Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"68xvYQhiWqzEy9tQ9J1i58","type":"Asset","createdAt":"2021-06-23T21:38:11.441Z","updatedAt":"2021-06-24T18:15:52.818Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2021 Auth0 State of Secure Identity Webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/68xvYQhiWqzEy9tQ9J1i58/765a03e30c8e8337f4a51e2f2a583dc3/State-of-Secure-Identity-Cover-Page.jpeg","details":{"size":89781,"image":{"width":600,"height":856}},"fileName":"State-of-Secure-Identity-Cover-Page.jpeg","contentType":"image/jpeg"}}},"title":"2021 Auth0 State of Secure Identity Webinar","id":"state-of-security-identity-webinar","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:41.972Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7CAtFnwXqSFhIRIS8IJqPC","type":"Asset","createdAt":"2021-06-24T18:49:23.657Z","updatedAt":"2021-06-24T18:49:23.657Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How to Add Flexible Identity Verification Workflows","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7CAtFnwXqSFhIRIS8IJqPC/8e64e96b8bc473997de6c07d1248cdac/IDDW_WEbinar_Cover_Image.png","details":{"size":191662,"image":{"width":600,"height":856}},"fileName":"IDDW WEbinar Cover Image.png","contentType":"image/png"}}},"title":"How to Add Flexible Identity Verification Workflows","id":"iddw-auth0-flexible-id-verification","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:40.961Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1e9mzgH3DyduCrA4XE8KKl","type":"Asset","createdAt":"2021-06-08T23:22:28.624Z","updatedAt":"2021-06-16T20:22:53.827Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Driving Business with an Identity-Driven User Experience","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1e9mzgH3DyduCrA4XE8KKl/0129cc6449a705f4ff20c0b8261a3c9f/Auth0-Resource_Cover-Houston-GC.png","details":{"size":254374,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Houston-GC.png","contentType":"image/png"}}},"title":"Driving Business with an Identity-Driven User Experience","id":"driving-business-with-id-driven-ux","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:40.398Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31AmI6sn6vGg4JMwolJNcX","type":"Asset","createdAt":"2021-06-10T17:57:32.701Z","updatedAt":"2021-06-16T20:12:09.498Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Healthcare is Everyone's Business","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31AmI6sn6vGg4JMwolJNcX/d76bf74e55e11f6f6adb240cac9dc8d1/Auth0-Resource_Cover-Scaled_Access-GC.png","details":{"size":323498,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Scaled_Access-GC.png","contentType":"image/png"}}},"title":"Healthcare is everyone's business","id":"healthcare-is-everyones-business","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:40.084Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"71Sts4licxZPl0FahEjhe7","type":"Asset","createdAt":"2021-06-09T18:42:12.988Z","updatedAt":"2021-06-09T19:16:42.160Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Landing Page Cover Passwordless Checklist","file":{"url":"//images.ctfassets.net/2ntc334xpx65/71Sts4licxZPl0FahEjhe7/8051c9b36607ae0ed6e97bada91977b7/Landing_Page_Cover___Passwordless_Checklist.jpeg","details":{"size":85198,"image":{"width":600,"height":856}},"fileName":"Landing Page Cover _ Passwordless Checklist.jpeg","contentType":"image/jpeg"}}},"title":"Passwordless Authentication Checklist","id":"passwordless-authentication-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:39.728Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"tkdbmRu3NVBsPGQ2sdsC7","type":"Asset","createdAt":"2021-06-07T20:33:28.258Z","updatedAt":"2021-06-16T20:23:30.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Fixing Broken Authentication: Canada Edition","file":{"url":"//images.ctfassets.net/2ntc334xpx65/tkdbmRu3NVBsPGQ2sdsC7/5368a2c7977010a36c5cfb352219b766/Fixing_broken_auth_canada.jpeg","details":{"size":142052,"image":{"width":600,"height":856}},"fileName":"Fixing broken auth canada.jpeg","contentType":"image/jpeg"}}},"title":"Fixing Broken Authentication: Canada Edition","id":"fixing-broken-auth-canada","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:39.449Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"01dNoWbZGD85hMqsE73kWt","type":"Asset","createdAt":"2021-06-03T16:48:39.139Z","updatedAt":"2021-06-16T20:24:52.966Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modern CIAM: Platform and Centerpiece of Your Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/01dNoWbZGD85hMqsE73kWt/031babb94eac94ea30463246a16cc7f6/Auth0-Resource_Cover-Booleans-GC.png","details":{"size":337773,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Booleans-GC.png","contentType":"image/png"}}},"title":"Modern CIAM: Platform and Centerpiece of Your Innovation","id":"ciam-centerpiece-of-your-innovation","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:39.115Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UbcJWuSSUCSyDJeTi1kAI","type":"Asset","createdAt":"2021-06-02T04:12:43.386Z","updatedAt":"2021-06-16T20:25:56.440Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UbcJWuSSUCSyDJeTi1kAI/017c559c8183f46b60d170b7f9084e30/getresult.jpeg","details":{"size":98894,"image":{"width":600,"height":856}},"fileName":"getresult.jpeg","contentType":"image/jpeg"}}},"title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","id":"ciam-consent-management-on-demand-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:38.745Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ELKE9cy2Tx2dVAyBpfGNT","type":"Asset","createdAt":"2021-05-27T21:17:19.552Z","updatedAt":"2021-06-16T20:26:22.954Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":4,"locale":"en-US"},"fields":{"title":"Checklist: Is Your Identity Secure - Canada Edition","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ELKE9cy2Tx2dVAyBpfGNT/1239f8cd4a2f9dec28e017b563c112cd/checklist_canada_-_cover_image.jpeg","details":{"size":125433,"image":{"width":600,"height":856}},"fileName":"checklist canada - cover image.jpeg","contentType":"image/jpeg"}}},"title":"Checklist: Is Your Identity Secure - Canada Edition","id":"identity-checklist-canada","language":"EN"},{"type":"videos","updatedAt":"2022-09-09T03:12:38.493Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"27n16bDqtReLrEETdEHzPp","type":"Asset","createdAt":"2021-05-25T16:11:29.839Z","updatedAt":"2021-06-16T20:28:48.011Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"WebAuthn with Device Biometrics for MFA Demo Video","file":{"url":"//images.ctfassets.net/2ntc334xpx65/27n16bDqtReLrEETdEHzPp/d887fa5213309c98404d550257a59ae7/_Landing_Page__Gated_Content__any___625x892px___3_.jpeg","details":{"size":68568,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (3).jpeg","contentType":"image/jpeg"}}},"title":"WebAuthn with Device Biometrics for MFA Demo Video","id":"webauthn-with-biometrics","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:37.862Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"SiIqyALBPfqAJXElBBEv9","type":"Asset","createdAt":"2021-05-25T17:19:37.556Z","updatedAt":"2021-05-25T17:37:09.290Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/SiIqyALBPfqAJXElBBEv9/501f556d1db1d726505d6a57976bacf7/_Landing_Page__Gated_Content__any___625x892px___1___1_.jpeg","details":{"size":70920,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (1) (1).jpeg","contentType":"image/jpeg"}}},"title":"7 Things You Need to Know About Passwordless Authentication","id":"passwordless-authentication","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:37.584Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6rCe9PlcOpDryLdnRRjWIV","type":"Asset","createdAt":"2021-05-21T22:20:46.332Z","updatedAt":"2021-05-21T22:20:46.332Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Build vs Buy: Guide to Evaluating Identity Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6rCe9PlcOpDryLdnRRjWIV/e21faa599fc672b335786c5e72df7172/_Google_Docs__Whitepaper__Letter_size___2_.jpeg","details":{"size":139378,"image":{"width":600,"height":856}},"fileName":"[Google Docs] Whitepaper (Letter size) (2).jpeg","contentType":"image/jpeg"}}},"title":"Build vs Buy: Guide to Evaluating Identity Management - Canada Edition","id":"build-vs-buy-guide-iam-canada-2021-05","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:37.321Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"523ycocLLfGqw28OdxHUpY","type":"Asset","createdAt":"2021-05-24T16:59:37.524Z","updatedAt":"2021-06-16T20:16:10.997Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"The Auth0 Identity Maturity Framework Whitepaper","file":{"url":"//images.ctfassets.net/2ntc334xpx65/523ycocLLfGqw28OdxHUpY/c3eb9954b630e4d024ddee5701fd7f35/_Google_Docs__Report__Letter_size_.jpeg","details":{"size":56249,"image":{"width":600,"height":856}},"fileName":"[Google Docs] Report (Letter size).jpeg","contentType":"image/jpeg"}}},"title":"The Auth0 Identity Maturity Framework","id":"the-auth0-identity-maturity-framework","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:37.040Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5khyiTSQOVckdbuRhy0277","type":"Asset","createdAt":"2021-05-21T00:47:52.013Z","updatedAt":"2021-05-21T00:47:52.013Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Enhancing Digital Citizen Services through Identity and Access Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5khyiTSQOVckdbuRhy0277/412f18843dd7bdfc74f54e107d3d3616/_Landing_Page__Gated_Content___Logo__625x892px_.jpeg","details":{"size":96755,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content + Logo (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Enhancing Digital Citizen Services through IAM","id":"auth0-cdg-iam-2021","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:36.492Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Rhe4zU1Eh9hVcAJ3EDFpR","type":"Asset","createdAt":"2021-04-22T19:35:55.328Z","updatedAt":"2021-04-22T19:35:55.328Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM Buyer's Guide Checklist cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Rhe4zU1Eh9hVcAJ3EDFpR/25b9074f5d477451bbafb570ed0b230c/_Landing_Page__Gated_Content__any___625x892px_.jpeg","details":{"size":94206,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"CIAM Buyer’s Guide Checklist","id":"ciam-buyers-guide-checklist","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:12:36.199Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7j7BuYiaBH9qMcFiyZyIiD","type":"Asset","createdAt":"2021-04-23T00:47:57.378Z","updatedAt":"2021-04-23T00:56:00.146Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"[Landing Page] Gated Content (any) (625x892px) (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7j7BuYiaBH9qMcFiyZyIiD/3c70f2212c3af98347ceb2bc4319e60d/_Landing_Page__Gated_Content__any___625x892px___2_.jpeg","details":{"size":64159,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"title":"Live Demo: Auth0 for Customer Identity","id":"live-demo-auth0-for-ciam-04-2021","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:12:29.011Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"35fENop6v3SiTxTGIw6ztz","type":"Asset","createdAt":"2021-04-20T23:31:28.319Z","updatedAt":"2022-09-09T03:12:26.242Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":49,"revision":12,"locale":"en-US"},"fields":{"title":"Data Security Matters Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/35fENop6v3SiTxTGIw6ztz/c6357cbdbe627ec860c27b7bdbcdc271/_Landing_Page__Gated_Content__any___625x892px_.jpeg","details":{"size":57998,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Data Security Matters","id":"data-security-matters","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:11:52.888Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1pRKKaxcbCDVqi2jEX8EFl","type":"Asset","createdAt":"2021-03-29T13:07:33.061Z","updatedAt":"2021-04-20T21:51:16.804Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"How a Trusted User Login can Fuel Your Business Growth - Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1pRKKaxcbCDVqi2jEX8EFl/f8f21116e53056cc927331f5913d51f2/Auth0-Trusted-User-Login-Cover.png","details":{"size":146706,"image":{"width":600,"height":856}},"fileName":"Auth0-Trusted-User-Login-Cover.png","contentType":"image/png"}}},"title":"How a Trusted User Login Can Fuel Your Business Growth","id":"trusted-user-login-criipto","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:52.623Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4baEqXyGdli6Tts0WrGt6d","type":"Asset","createdAt":"2021-04-16T18:03:44.857Z","updatedAt":"2021-04-19T23:18:15.687Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":4,"locale":"en-US"},"fields":{"title":"Business Customer Identity Organizations cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4baEqXyGdli6Tts0WrGt6d/8004ba1bdc2f610a5e075818d7b7de9d/Guides_Cover_Letter.jpeg","details":{"size":57827,"image":{"width":600,"height":856}},"fileName":"Guides_Cover_Letter.jpeg","contentType":"image/jpeg"}}},"title":"Business Customer Identity - Organizations","id":"business-customer-identity-organizations","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:11:52.195Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"66K7BBNt6BM3l17fsHYPlQ","type":"Asset","createdAt":"2021-03-31T19:55:39.035Z","updatedAt":"2021-03-31T19:55:39.035Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Modern Digital Identity: How to Wow customers with a first impression","file":{"url":"//images.ctfassets.net/2ntc334xpx65/66K7BBNt6BM3l17fsHYPlQ/b2b3629f98fade44e1ee831bc07a1904/Auth0-Resource_Cover-IS4U.png","details":{"size":219011,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-IS4U.png","contentType":"image/png"}}},"title":"Modern Digital Identity: How to Wow Customers with a First Impression","id":"is4u-modern-digital-identity","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:51.479Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"72ZXsaFepHRehEB4z8YWFq","type":"Asset","createdAt":"2021-04-06T15:44:02.935Z","updatedAt":"2021-04-06T15:49:26.470Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":4,"locale":"en-US"},"fields":{"title":"FinServ CIAM checklist cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/72ZXsaFepHRehEB4z8YWFq/cdef6ca3b622974f2251112487602a17/Screen_Shot_2021-04-06_at_8.48.33_AM.png","details":{"size":167113,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-04-06 at 8.48.33 AM.png","contentType":"image/png"}}},"title":"Financial Services CIAM Buyer’s Guide Checklist","id":"finserv-ciam-buyers-guide-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:51.120Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XfAckqdAN1btdxSCEOH7P","type":"Asset","createdAt":"2021-03-31T17:10:29.719Z","updatedAt":"2021-04-05T16:22:27.792Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"A Cure for Balancing Security, Privacy and Convenience in Healthcare","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4XfAckqdAN1btdxSCEOH7P/fab4aaf491ba16b5a5f77e597f4bb5fd/Auth0_HIMMSS_WP_Cover.png","details":{"size":43992,"image":{"width":600,"height":856}},"fileName":"Auth0_HIMMSS_WP_Cover.png","contentType":"image/jpeg"}}},"title":"A Cure for Balancing Security, Privacy and Convenience in Healthcare","id":"identity-driven-innovation","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:50.678Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5qXr1wxnEG5siqWOUYGs0x","type":"Asset","createdAt":"2021-04-01T14:40:59.116Z","updatedAt":"2021-04-01T14:41:56.197Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Retail CIAM Buyer’s Guide Checklist","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5qXr1wxnEG5siqWOUYGs0x/5c7960ad7ac61fc77cdfc92665df56d4/Auth0-Retail-CIAM-checklist-COVER.png","details":{"size":158193,"image":{"width":600,"height":856}},"fileName":"Auth0-Retail-CIAM-checklist-COVER.png","contentType":"image/png"}}},"title":"Retail CIAM Buyer’s Guide Checklist","id":"retail-ciam-buyers-guide-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:50.275Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3MmkGh4WJAzg0ggniHChI4","type":"Asset","createdAt":"2021-04-01T19:00:18.549Z","updatedAt":"2021-04-01T19:00:18.549Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Healthcare CIAM Buyer’s Guide Checklist - COVER","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3MmkGh4WJAzg0ggniHChI4/08d49098b0208936734fd27939b20236/Auth0-Healthcare-CIAM-Buyers-Guide-Checklist-COVER.png","details":{"size":166360,"image":{"width":600,"height":856}},"fileName":"Auth0-Healthcare-CIAM-Buyers-Guide-Checklist-COVER.png","contentType":"image/png"}}},"title":"Healthcare CIAM Buyer’s Guide Checklist","id":"healthcare-ciam-buyers-guide-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:49.909Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"DSdnY9rH1QO7LHuu88Orm","type":"Asset","createdAt":"2021-03-23T17:43:04.050Z","updatedAt":"2021-03-23T17:59:29.822Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"en-US"},"fields":{"title":"CIAM helps find the balance between security and customer experience","file":{"url":"//images.ctfassets.net/2ntc334xpx65/DSdnY9rH1QO7LHuu88Orm/b3bbd1c537edebd4702e04ff92b4a40e/Seure-CIAM-LP-Cover.png","details":{"size":226151,"image":{"width":600,"height":856}},"fileName":"Seure-CIAM-LP-Cover.png","contentType":"image/png"}}},"title":"CIAM - Balance Security with Customer Experience","id":"secure-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:49.498Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"61hGzvxt9q7oGHTMLvQIPo","type":"Asset","createdAt":"2021-03-22T19:07:51.411Z","updatedAt":"2021-04-01T17:24:11.072Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":33,"revision":8,"locale":"en-US"},"fields":{"title":"Distribution-Drives-Innovation-LP-Cover.","description":"Distribution-Drives-Innovation-LP-Cover.","file":{"url":"//images.ctfassets.net/2ntc334xpx65/61hGzvxt9q7oGHTMLvQIPo/5c2ee81768d2d6a8342f903e07eb3c2f/Screen_Shot_2021-04-01_at_10.00.07_AM.png","details":{"size":286161,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-04-01 at 10.00.07 AM.png","contentType":"image/png"}}},"title":"Why Businesses Are Focusing on Customer Identity","id":"disruption-drives-innovation","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:48.980Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3j9tQjQrCXfhgLVBejMBdz","type":"Asset","createdAt":"2021-03-26T15:57:31.262Z","updatedAt":"2021-03-26T16:03:00.911Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3j9tQjQrCXfhgLVBejMBdz/e503907d3a707ef8943f90ea1bc9a8d8/Screen_Shot_2021-03-25_at_5.02.54_PM.png","details":{"size":184306,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-03-25 at 5.02.54 PM.png","contentType":"image/png"}}},"title":"How Modern CIAM Solutions Drive Growth","id":"ciam-transformation","language":"EN"},{"type":"videos","updatedAt":"2022-09-09T03:11:48.700Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"519QhjCcrccOsxSbTR7lVY","type":"Asset","createdAt":"2021-03-04T19:05:17.541Z","updatedAt":"2021-03-04T19:05:17.541Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Customer Identity and Access Management (CIAM) on AWS Demo Video","file":{"url":"//images.ctfassets.net/2ntc334xpx65/519QhjCcrccOsxSbTR7lVY/46c3330167acfbf4a2e96430fdfde911/Auth0-CIAM-Demo-on-AWS-cover.jpg","details":{"size":235402,"image":{"width":1401,"height":1999}},"fileName":"Auth0-CIAM-Demo-on-AWS-cover.jpg","contentType":"image/jpeg"}}},"title":"Auth0 Customer Identity and Access Management (CIAM) on AWS Demo Video","id":"auth0-ciam-on-aws-demo-video","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:11:48.421Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UAzKJQBHUYpKrvxYskYH6","type":"Asset","createdAt":"2021-02-24T23:47:50.785Z","updatedAt":"2021-02-24T23:47:50.785Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Untitled design (5)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UAzKJQBHUYpKrvxYskYH6/b18b7d8d5d8cbb22fd405577b704b145/Untitled_design__5_.png","details":{"size":272861,"image":{"width":600,"height":856}},"fileName":"Untitled design (5).png","contentType":"image/png"}}},"title":"Auth0 for B2B Identity Management ","id":"on-demand-demo-b2b-identity-management-auth0","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:11:48.125Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4LMNGwhPK0sEfb3p6oqCBF","type":"Asset","createdAt":"2021-02-12T17:27:43.837Z","updatedAt":"2021-02-12T17:36:52.085Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0AWS CloudSecurity eBook Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4LMNGwhPK0sEfb3p6oqCBF/bb1970ec12774dd8a1d0cda77b0ebc0a/Auth0AWS_CloudSecurity_eBook_Cover.png","details":{"size":122663,"image":{"width":600,"height":856}},"fileName":"Auth0AWS CloudSecurity eBook Cover.png","contentType":"image/png"}}},"title":"Security in the Cloud: Identity \u0026 Access Management \u0026 Mitigating Risk","id":"auth0-iam-cloudsecurity-ebook","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:47.811Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ecqA98CQGQFZrlGje8C1c","type":"Asset","createdAt":"2021-01-26T14:43:34.991Z","updatedAt":"2021-01-26T14:43:34.991Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"Preparing-for-Japans-Amended-APPI-Law-Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ecqA98CQGQFZrlGje8C1c/7d11b433c74b9af1cfffec83bfc9c576/Preparing-for-Japans-Amended-APPI-Law-Cover.png","details":{"size":154065,"image":{"width":600,"height":856}},"fileName":"Preparing-for-Japans-Amended-APPI-Law-Cover.png","contentType":"image/png"}}},"title":"What You Need to Know about Japan’s Amended APPI","id":"amended-appi","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:47.483Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3HQucCC0pQSPU39UZkwRjm","type":"Asset","createdAt":"2021-01-27T23:47:19.023Z","updatedAt":"2021-01-28T00:10:54.666Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Data Breach WP cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3HQucCC0pQSPU39UZkwRjm/010f8186344523ec71c40e403bb56af3/Data_Breach_WP_cover.jpeg","details":{"size":25316,"image":{"width":600,"height":856}},"fileName":"Data Breach WP cover.jpeg","contentType":"image/jpeg"}}},"title":"How Does a Data Breach Impact Your Business?","id":"data-breach-impact-on-business","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:11:42.199Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7KAm2wux8z80lfQJFk0PpX","type":"Asset","createdAt":"2021-01-25T14:29:45.614Z","updatedAt":"2022-09-09T03:11:39.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"Identifying as Citizens cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7KAm2wux8z80lfQJFk0PpX/e37509776ef490a310ab03b96ac916d9/Resources_Page__Cover.jpeg","details":{"size":84439,"image":{"width":600,"height":856}},"fileName":"Resources_Page__Cover.jpeg","contentType":"image/jpeg"}}},"title":"Identifying as Citizens: Local Authority perspectives on Identity","id":"identifying-as-citizens","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:10:15.861Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Nqkz9rhHoQmP1meMumyJE","type":"Asset","createdAt":"2020-03-12T15:03:14.252Z","updatedAt":"2020-03-16T16:47:57.191Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":2,"locale":"en-US"},"fields":{"title":"cover-oauth-and-openid","description":"Cover for the OAuth2 and OpenID Connect ebook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Nqkz9rhHoQmP1meMumyJE/79c05d6ca8bec0d446a2b767c2849574/Cover-image.png","details":{"size":791753,"image":{"width":600,"height":856}},"fileName":"Cover-image.png","contentType":"image/png"}}},"title":"OAuth2 and OpenID Connect: The Professional Guide","id":"oauth-openid-connect-professional-guide","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:15.543Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2qgMOjuewsWCTGV0BAyhaA","type":"Asset","createdAt":"2021-01-04T23:52:56.740Z","updatedAt":"2021-01-04T23:52:56.740Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Resources-Cover-Insurance-BuildvsBuy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2qgMOjuewsWCTGV0BAyhaA/45c20fcfc95cd842ca0f524cba581d03/Resources-Cover-Insurance-BuildvsBuy.png","details":{"size":173269,"image":{"width":600,"height":856}},"fileName":"Resources-Cover-Insurance-BuildvsBuy.png","contentType":"image/png"}}},"title":"Build vs. Buy for Insurance: The Insurance Guide to CIAM and IAM","id":"build-vs-buy-for-insurance","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:15.191Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2PP39po3kstdBXSrzk2jN","type":"Asset","createdAt":"2021-01-05T00:18:00.376Z","updatedAt":"2021-01-05T00:18:00.376Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources-Cover-Healthcare-BuildvsBuy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2PP39po3kstdBXSrzk2jN/02f07cedcbcc99f23c5ec0fbffbd63cd/Resources-Cover-Healthcare-BuildvsBuy.jpg.jpeg","details":{"size":115498,"image":{"width":600,"height":856}},"fileName":"Resources-Cover-Healthcare-BuildvsBuy.jpg.jpeg","contentType":"image/jpeg"}}},"title":"Build vs. Buy for Healthcare: A Healthcare Guide for Identity","id":"build-vs-buy-for-healthcare","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:14.728Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6OjAF1niXYHjINAKo5BDl0","type":"Asset","createdAt":"2021-01-04T23:27:50.000Z","updatedAt":"2021-01-04T23:27:50.000Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Resources-Cover-Finance-BuildvsBuy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6OjAF1niXYHjINAKo5BDl0/cfd540053c19c67b9f561af66ccf00c1/Resources-Cover-Finance-BuildvsBuy.jpg.jpeg","details":{"size":30096,"image":{"width":600,"height":856}},"fileName":"Resources-Cover-Finance-BuildvsBuy.jpg.jpeg","contentType":"image/jpeg"}}},"title":"Build vs. Buy for Finance: A Banking Guide to CIAM and IAM","id":"build-vs-buy-for-finance","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:14.429Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ajR6pgjE0oBPp8hi7XgYf","type":"Asset","createdAt":"2021-01-05T21:07:22.588Z","updatedAt":"2021-01-05T21:07:22.588Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover (4)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ajR6pgjE0oBPp8hi7XgYf/819208fb684fcda0314ba07bd1c4415e/Resources_Page__Cover__4_.png","details":{"size":95188,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (4).png","contentType":"image/png"}}},"title":"Forrester Wave: Customer Identity and Access Management, Q4 2020","id":"forrester-wave-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:14.070Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5JwVuFcRROpJ72pjoE2g1O","type":"Asset","createdAt":"2021-01-05T20:52:33.853Z","updatedAt":"2021-01-05T20:52:33.853Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover AMFA One pager (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5JwVuFcRROpJ72pjoE2g1O/0a4b29162b6fb7468b18f7ca35a6e836/Resources_Page__Cover_AMFA_One_pager__1_.png","details":{"size":36365,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover AMFA One pager (1).png","contentType":"image/png"}}},"title":"Secure and Seamless User Experience with Auth0’s Adaptive MFA","id":"secure-user-experience-adaptive-mfa","language":"EN"},{"type":"videos","updatedAt":"2022-09-09T03:10:13.801Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6JWKvaGUp1AjdtfGZlI8vZ","type":"Asset","createdAt":"2021-01-04T23:57:27.210Z","updatedAt":"2021-01-04T23:57:27.210Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"AMFA Demo video cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6JWKvaGUp1AjdtfGZlI8vZ/786e8ef52e7d68ba954e790f3372a90a/AMFA_Demo_video_cover.png","details":{"size":42278,"image":{"width":600,"height":856}},"fileName":"AMFA Demo video cover.png","contentType":"image/png"}}},"title":" Adaptive MFA Overview \u0026 Demo","id":"adaptive-MFA-demo-video","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:13.496Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"69TAEnFZa0Zry5YoQTO5U6","type":"Asset","createdAt":"2021-01-04T23:31:15.969Z","updatedAt":"2021-01-04T23:31:15.969Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover Bot Detection","file":{"url":"//images.ctfassets.net/2ntc334xpx65/69TAEnFZa0Zry5YoQTO5U6/cf1b573174e4db49456569d633912c2e/Resources_Page__Cover_Bot_Detection.png","details":{"size":34008,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover Bot Detection.png","contentType":"image/png"}}},"title":"Securing Identities with Auth0’s Bot Detection","id":"securing-identities-with-bot-detection","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:13.203Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6OVbCtydsZmEaTpOH66N4V","type":"Asset","createdAt":"2020-12-22T18:12:52.246Z","updatedAt":"2020-12-22T18:12:52.246Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"build-vs-buy-media","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6OVbCtydsZmEaTpOH66N4V/7f8542528effd23d286b74426de8221f/Resources_Page__Cover__5_.png","details":{"size":680254,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (5).png","contentType":"image/png"}}},"title":"Build vs. Buy for Media: A Media Guide to CIAM and IAM","id":"build-vs-buy-for-media","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:12.784Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"32voJW8EGItPwtRo55RH5B","type":"Asset","createdAt":"2020-12-22T03:40:44.191Z","updatedAt":"2020-12-22T03:40:44.191Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"build-vs-buy-retail","file":{"url":"//images.ctfassets.net/2ntc334xpx65/32voJW8EGItPwtRo55RH5B/81740ebc3ab3ed87fe443230a67b71cd/Resources_Page__Cover__1___2_.png","details":{"size":616785,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1) (2).png","contentType":"image/png"}}},"title":"Build vs. Buy for Retail: The Retailer’s Guide to CIAM and IAM ","id":"build-vs-buy-for-retail","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:12.485Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"59ejFwZ4AxXbFdcUsWdZGV","type":"Asset","createdAt":"2020-10-21T19:30:38.494Z","updatedAt":"2020-10-21T19:30:38.495Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/59ejFwZ4AxXbFdcUsWdZGV/0c8ae7a30b0bd6d54be64cae36b79111/Resources_Page__Cover__5_.jpeg","details":{"size":62105,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (5).jpeg","contentType":"image/jpeg"}}},"title":"To Build or to Buy: Evaluating B2B Identity Management Solutions","id":"build-vs-buy-for-b2b-evaluating-identity-management","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:12.131Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3AKdqQiPBb7Dn5zuljzoHN","type":"Asset","createdAt":"2020-10-14T17:30:23.456Z","updatedAt":"2020-10-14T17:30:23.456Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"IdentityPerimeter Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3AKdqQiPBb7Dn5zuljzoHN/dd9a8152a802750e21884df07bbf77e2/IdentityPerimeter_Cover.png","details":{"size":39846,"image":{"width":600,"height":856}},"fileName":"IdentityPerimeter_Cover.png","contentType":"image/png"}}},"title":"Protecting Your Perimeter Means Protecting Identity","id":"identity-perimeter","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:11.775Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5MQyPjitfGM1keOLqXY78E","type":"Asset","createdAt":"2020-10-14T17:28:47.197Z","updatedAt":"2020-10-14T17:28:47.197Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Checklist web cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5MQyPjitfGM1keOLqXY78E/14994fdecb5818af759444d5b4b8bc0b/Checklist_web_cover.jpeg","details":{"size":59111,"image":{"width":600,"height":856}},"fileName":"Checklist_web_cover.jpeg","contentType":"image/jpeg"}}},"title":"Broken Authentication Checklist","id":"broken-auth-checklist","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:10:11.346Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"NtaJUP4QqCjydjcyoNqBy","type":"Asset","createdAt":"2020-10-09T19:17:23.624Z","updatedAt":"2020-10-12T20:39:25.566Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Expanding our Ecosystem with Auth0 Marketplace Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/NtaJUP4QqCjydjcyoNqBy/ab034adf9a3599a87e61fb5442cfc8dc/Marketplace_Webinar_Resources_Page_Cover.jpeg","details":{"size":135160,"image":{"width":600,"height":856}},"fileName":"Marketplace Webinar Resources Page Cover.jpeg","contentType":"image/jpeg"}}},"title":"Expanding our Ecosystem with Auth0 Marketplace","id":"marketplace-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:11.042Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"huCH9KQIy9gumG8S8gIbo","type":"Asset","createdAt":"2020-10-14T15:56:54.888Z","updatedAt":"2020-10-14T15:58:24.101Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"HowDevTeamsPurchaseSaaS Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/huCH9KQIy9gumG8S8gIbo/ab84bfaf7e9db6e0b82278d2dcb846b1/HowDevTeamsPurchaseSaaS_Cover.png","details":{"size":72493,"image":{"width":600,"height":856}},"fileName":"HowDevTeamsPurchaseSaaS_Cover.png","contentType":"image/png"}}},"title":"How Development Teams Purchase SaaS - Auth0","id":"how-development-teams-purchase-saas","language":"EN"},{"type":"videos","updatedAt":"2022-09-09T03:10:10.730Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"UYwn44LeUD6K3liCvhoNh","type":"Asset","createdAt":"2020-03-02T17:58:33.761Z","updatedAt":"2020-03-02T18:09:24.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":39,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 authentication in Kiva's microservices architecture","file":{"url":"//images.ctfassets.net/2ntc334xpx65/UYwn44LeUD6K3liCvhoNh/4afdd5b4f3d421862d77ce82b638bab5/template_resource_covers_Kiva.jpeg","details":{"size":45196,"image":{"width":600,"height":856}},"fileName":"template_resource_covers_Kiva.jpeg","contentType":"image/jpeg"}}},"title":"Auth0 Delivered Authentication for Kiva's Microservices Architecture","id":"kiva-authentication-video","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:10.007Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1O8Xhs2e3esieMu6Mm62M8","type":"Asset","createdAt":"2018-03-06T15:32:43.351Z","updatedAt":"2019-11-06T11:24:07.456Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper 3 Reasons Your Identity Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1O8Xhs2e3esieMu6Mm62M8/24e7daff37679bc8df635ca762c70759/Whitepaper_3_Reasons_Your_Identity_Management.png","details":{"size":375657,"image":{"width":600,"height":856}},"fileName":"Whitepaper_3 Reasons Your Identity Management.png","contentType":"image/png"}}},"title":"3 Reasons Your Identity Management Solution is Leaking Revenue","id":"3-reasons-your-iam-is-leaking-revenue","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:09.599Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Cm9mjcDrUmoyecKm6ge00","type":"Asset","createdAt":"2018-03-06T15:32:46.338Z","updatedAt":"2019-11-06T11:23:58.256Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper Unlocking B2B Saas","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5Cm9mjcDrUmoyecKm6ge00/f105d56a8e19577016ea03398ff29965/Whitepaper_Unlocking_B2B_Saas.png","details":{"size":402162,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Unlocking B2B Saas.png","contentType":"image/png"}}},"title":"Unlocking B2B SaaS Growth with Identity Management","id":"unlock-b2b-saas-growth-iam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:09.304Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5HxWpApUSQ8emsSMWi8mYu","type":"Asset","createdAt":"2018-03-06T15:32:45.897Z","updatedAt":"2019-11-06T11:23:59.359Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper Prevent Healtcare","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5HxWpApUSQ8emsSMWi8mYu/8d25061aab1d6bb13a4801a58e09ccdc/Whitepaper_Prevent_Healtcare.png","details":{"size":64204,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Prevent Healtcare.png","contentType":"image/png"}}},"title":"The Guide to Identity Management in Healthcare","id":"prevent-healthcare-data-breaches-iam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:08.900Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7M8McJbkTCWayMIQiYssg0","type":"Asset","createdAt":"2018-03-06T15:32:31.537Z","updatedAt":"2019-11-06T11:24:17.831Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper The Total Economic Impact of Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7M8McJbkTCWayMIQiYssg0/0eaccf14ccd24995a7b258a70ce2ec87/Whitepaper_The_Total_Economic_Impact_of_Auth0.png","details":{"size":72097,"image":{"width":600,"height":856}},"fileName":"Whitepaper_The Total Economic Impact of Auth0.png","contentType":"image/png"}}},"title":"The Total Economic Impact of Auth0","id":"forrester-tei-research-case-study","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:08.524Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5wPFSJhGJUIOiMqCYKYyoG","type":"Asset","createdAt":"2018-03-06T15:32:25.586Z","updatedAt":"2019-11-06T11:24:22.782Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper Build vs Buy- Guide to Evaluating IAM","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5wPFSJhGJUIOiMqCYKYyoG/a534ff6da757ecbb46d73d105caa1a0e/Whitepaper_Build_vs_Buy-_Guide_to_Evaluating_IAM.png","details":{"size":350042,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Build vs Buy- Guide to Evaluating IAM.png","contentType":"image/png"}}},"title":"Build vs. Buy: Guide to Evaluating Identity Management","id":"build-vs-buy-evaluating-identity-management","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:08.079Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vC3ZvkUPmWgwcWSowUUmU","type":"Asset","createdAt":"2018-03-06T15:32:44.633Z","updatedAt":"2019-11-06T11:24:05.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper Auth0's Approach to Info Security","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6vC3ZvkUPmWgwcWSowUUmU/0d7b9ab29dd1052c32578a60bc3754f9/Whitepaper_Auth0_s_Approach_to_Info_Security.png","details":{"size":487243,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Auth0's Approach to Info Security.png","contentType":"image/png"}}},"title":"Auth0's Approach to Information Security","id":"auth0-security","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:07.760Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"OK6UWGWGw8MiMUYKai6QS","type":"Asset","createdAt":"2018-04-04T13:38:53.147Z","updatedAt":"2019-11-06T11:22:01.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":2,"locale":"en-US"},"fields":{"title":"GDPR Checklist 600","file":{"url":"//images.ctfassets.net/2ntc334xpx65/OK6UWGWGw8MiMUYKai6QS/a5e95a00e25b49c1537efa980a81213e/GDPR_Checklist.png","details":{"size":358117,"image":{"width":600,"height":856}},"fileName":"GDPR Checklist.png","contentType":"image/png"}}},"title":"Don't Compromise on Identity Because of GDPR Compliance: A Checklist","id":"gdpr-id-checklist","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:07.375Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2RYVEjQLoMZH8Yz1SKeVXA","type":"Asset","createdAt":"2019-02-07T19:49:13.473Z","updatedAt":"2019-11-06T11:21:04.632Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":4,"locale":"en-US"},"fields":{"title":"frost-sullivan-global-iam-technology-award","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2RYVEjQLoMZH8Yz1SKeVXA/d455f8418219a572ad2859fb18bdd23a/Whitepaper_Global_Identity_and_Access_Management_Technology_Innovation_Award.png","details":{"size":414783,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Global Identity and Access Management Technology Innovation Award.png","contentType":"image/png"}}},"title":"Frost \u0026 Sullivan’s 2019 Global IAM Technology Innovation Award winner","id":"frost-sullivan-global-iam-technology-award","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:06.750Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7sXniUYEpEdXfv8BbKNYWC","type":"Asset","createdAt":"2019-10-09T15:45:18.795Z","updatedAt":"2020-12-14T20:54:45.283Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":4,"locale":"en-US"},"fields":{"title":"When is MFA the Right Choice - Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7sXniUYEpEdXfv8BbKNYWC/88a8161eb166e26f43efd9cd9406f7f8/Resources_Page__Cover.png","details":{"size":34990,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.png","contentType":"image/png"}}},"title":"When is MFA the Right Choice?","id":"is-mfa-the-right-choice","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:06.428Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5oYNXdrLoo5oezaYUNjXmE","type":"Asset","createdAt":"2019-12-09T23:18:20.242Z","updatedAt":"2019-12-23T16:11:03.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":4,"locale":"en-US"},"fields":{"title":"Internet Retailer Survey- Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5oYNXdrLoo5oezaYUNjXmE/e185f44a4e5a963fc452afc576b8ee69/Cover-ReDesign-Internet-Retailer-Survey-01.png","details":{"size":284155,"image":{"width":600,"height":856}},"fileName":"Cover-ReDesign-Internet-Retailer-Survey-01.png","contentType":"image/png"}}},"title":" 2019 Retail Data Security Report","id":"Identity-in-Retail-Report","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:06.140Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6dU3DBG0CM644gQ1GqASR7","type":"Asset","createdAt":"2019-11-26T21:35:01.910Z","updatedAt":"2019-11-26T21:35:01.910Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The Simple Guide to CCPA Compliance","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6dU3DBG0CM644gQ1GqASR7/6023a0ac4e0f435c069ce34cfbf7f0b7/Cover_CCPA_WP.png","details":{"size":517913,"image":{"width":600,"height":856}},"fileName":"Cover_CCPA_WP.png","contentType":"image/png"}}},"title":"The Simple Guide to CCPA Compliance","id":"simple-guide-CCPA-compliance","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:05.692Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"54aIoP245NB6e0H4u5A7wO","type":"Asset","createdAt":"2019-12-02T17:51:34.167Z","updatedAt":"2019-12-02T17:51:34.167Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":38,"revision":1,"locale":"en-US"},"fields":{"title":"How to Keep Up with the Evolving Definition of Personal Information (PI)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/54aIoP245NB6e0H4u5A7wO/ae64c698edbbb885f5b691b91c3c2c6f/Cover_Personal_Information_WP.png","details":{"size":429039,"image":{"width":600,"height":856}},"fileName":"Cover_Personal_Information_WP.png","contentType":"image/png"}}},"title":"How to Keep Up with the Evolving Definition of Personal Information","id":"evolving-definition-of-personal-Information","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:05.215Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2v7xgHrvLu8aTuyJwAgD6b","type":"Asset","createdAt":"2020-02-03T18:47:07.390Z","updatedAt":"2020-02-03T18:47:07.390Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":1,"locale":"en-US"},"fields":{"title":"consent management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2v7xgHrvLu8aTuyJwAgD6b/7c9ca48b686a08cca8ce13fc70f9fe52/Consent-Management-Cover.png","details":{"size":258998,"image":{"width":600,"height":856}},"fileName":"Consent-Management-Cover.png","contentType":"image/png"}}},"title":"Consent Management as a Competitive Advantage","id":"consent-management","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:04.821Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1WoTfCvbzOHVfM30grWA5z","type":"Asset","createdAt":"2020-01-31T20:30:59.580Z","updatedAt":"2020-01-31T20:34:39.940Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":2,"locale":"en-US"},"fields":{"title":"GDPR vs CCPA cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1WoTfCvbzOHVfM30grWA5z/f64d27f4a314e954bdece9cd2024611e/Cover_GDPR_vs_CCPA_wp.png","details":{"size":341286,"image":{"width":600,"height":856}},"fileName":"Cover_GDPR_vs_CCPA_wp.png","contentType":"image/png"}}},"title":"GDPR vs CCPA ","id":"GDPR-vs-CCPA","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:04.434Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3iwynfjFV1QS2bUwo5b2FA","type":"Asset","createdAt":"2020-10-12T18:21:54.942Z","updatedAt":"2020-10-12T18:21:54.942Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"user-migration-your-way-cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3iwynfjFV1QS2bUwo5b2FA/d28514da9f8ceec59f77a2eb24210349/8acf568b-4e12-4cd4-92e1-7bb46d8dc087.png","details":{"size":42184,"image":{"width":600,"height":856}},"fileName":"8acf568b-4e12-4cd4-92e1-7bb46d8dc087.png","contentType":"image/png"}}},"title":"User Migration Your Way","id":"user-migration-your-way","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:10:03.988Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6JYoTcya84dGUpFMbjs8Bx","type":"Asset","createdAt":"2019-11-11T22:18:00.850Z","updatedAt":"2019-11-11T22:18:00.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"locale":"en-US"},"fields":{"title":"Why AWS + Auth0 ","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6JYoTcya84dGUpFMbjs8Bx/32d3727d598ebc2d7b951fa7f29ea897/WHY_AWS.png","details":{"size":395170,"image":{"width":600,"height":856}},"fileName":"WHY AWS.png","contentType":"image/png"}}},"title":"Why AWS + Auth0","id":"aws-auth0-ebook","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:10:03.675Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ZKerRuBi0Tui0yuYwvAvy","type":"Asset","createdAt":"2020-02-10T21:20:32.136Z","updatedAt":"2020-02-11T00:09:16.660Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":2,"locale":"en-US"},"fields":{"title":"No_Distractions_Cover_Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ZKerRuBi0Tui0yuYwvAvy/774778fde86b0a67dd9cdcd1ee36101c/CoverImage.jpeg","details":{"size":67253,"image":{"width":600,"height":856}},"fileName":"CoverImage.jpeg","contentType":"image/jpeg"}}},"title":"#nodistractions: an eBook","id":"no-distractions-ebook-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:03.239Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7G3mmzCiooCqyM2Y4qaEaY","type":"Asset","createdAt":"2018-12-18T15:32:30.521Z","updatedAt":"2019-11-06T11:21:10.146Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Leadership Compass CIAM@1x","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7G3mmzCiooCqyM2Y4qaEaY/34e51a4096173a3b8d843f1d8a8535b4/Leadership_Compass_CIAM_1x.png","details":{"size":397606,"image":{"width":600,"height":856}},"fileName":"Leadership Compass CIAM@1x.png","contentType":"image/png"}}},"title":"KuppingerCole Leadership Compass: Consumer Identity Access Management","id":"leadership-compass-for-ciam","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:02.508Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4VgKTTVXfaYOIMMayee0ey","type":"Asset","createdAt":"2018-08-13T12:44:07.728Z","updatedAt":"2019-11-06T11:21:26.914Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Watchful health cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4VgKTTVXfaYOIMMayee0ey/3241fa7b42adb2822d0ba22c7173d2e4/Watchful_Health.jpg","details":{"size":175430,"image":{"width":600,"height":856}},"fileName":"Watchful Health.jpg","contentType":"image/jpeg"}}},"title":"A Story of Identity in Digital Transformation","id":"story-identity-in-digital-transformation","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:02.218Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"65K4D51yhi2WOMK2u46Msy","type":"Asset","createdAt":"2018-09-12T18:23:39.930Z","updatedAt":"2019-11-06T11:21:22.939Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"NowTech Authentication Management Solutions","file":{"url":"//images.ctfassets.net/2ntc334xpx65/65K4D51yhi2WOMK2u46Msy/35195308b9f941d49a5094a723ffa17d/Webinars_Forrester_Now_Tech.png","details":{"size":124043,"image":{"width":600,"height":856}},"fileName":"Webinars_Forrester Now Tech.png","contentType":"image/png"}}},"title":"Forrester Now Tech: Authentication Management Solutions","id":"forrester-now-tech-2018","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:01.502Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3r3W3GpJMAu42IwSAkKUK6","type":"Asset","createdAt":"2018-03-06T15:32:42.993Z","updatedAt":"2019-11-06T11:23:57.737Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Webinars The Guide to GDPR: Fine Determination","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3r3W3GpJMAu42IwSAkKUK6/a566e8fced7c8e7868eabc8f294f3ae7/Webinars_The_Guide_to_GDPR__Fine_Determination.png","details":{"size":404286,"image":{"width":600,"height":856}},"fileName":"Webinars_The Guide to GDPR: Fine Determination.png","contentType":"image/png"}}},"title":"Guide to GDPR. Fine Determination","id":"gdpr-fine-determination","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:00.694Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1jPk6zoVd840kcwymKaQA4","type":"Asset","createdAt":"2018-03-06T15:32:24.946Z","updatedAt":"2019-11-06T11:24:21.701Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper 12 Fake GDPR","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1jPk6zoVd840kcwymKaQA4/bcde2ab8f242f5f53a0a92ad4b7911bd/Whitepaper_12_Fake_GDPR.png","details":{"size":377618,"image":{"width":600,"height":856}},"fileName":"Whitepaper_12 Fake GDPR.png","contentType":"image/png"}}},"title":"Guide to GDPR, Security Provisions","id":"gdpr-security-provisions","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:10:00.163Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"AiF9XAXJZVfIe2iIg3C3h","type":"Asset","createdAt":"2020-04-09T22:48:38.926Z","updatedAt":"2020-04-09T22:48:38.926Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"PMI-CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/AiF9XAXJZVfIe2iIg3C3h/2148d0a8b991824f81d587ffaea3384b/Cover_post-merger-wp.png","details":{"size":90622,"image":{"width":600,"height":856}},"fileName":"Cover_post-merger-wp.png","contentType":"image/png"}}},"title":"Managing Identity: 10 Steps to a Smoother Post-Merger Integration","id":"Managing-Identitity-10-steps-PMI","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:59.879Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"G6aCiMK0hGyYayhMMTlSr","type":"Asset","createdAt":"2020-05-11T15:44:14.600Z","updatedAt":"2020-05-15T16:49:44.125Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":38,"revision":4,"locale":"en-US"},"fields":{"title":"The 2020 State of Application Assembly","file":{"url":"//images.ctfassets.net/2ntc334xpx65/G6aCiMK0hGyYayhMMTlSr/ec3c0865c4cb9e508d3e4e09111a13c4/_FINAL_SoAA-Cover-600x856__1_.png","details":{"size":49477,"image":{"width":600,"height":856}},"fileName":"[FINAL]SoAA-Cover-600x856 (1).png","contentType":"image/png"}}},"title":"The 2020 State of Application Assembly","id":"state-app-assembly-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:59.091Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"41H7BeYWbRnI5uU8Fi5WM6","type":"Asset","createdAt":"2020-06-28T18:54:56.831Z","updatedAt":"2020-06-28T19:04:46.080Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"power-standardized-identity-CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/41H7BeYWbRnI5uU8Fi5WM6/036632d9ce3a430b74bca9ca14344ec6/Resources_Page__Cover.jpeg","details":{"size":43547,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.jpeg","contentType":"image/jpeg"}}},"title":"The Power of a Standardized Identity Strategy","id":"power-standardized-identity","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:58.805Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"357ZCuIFXr6zoHiYpez1Jm","type":"Asset","createdAt":"2019-11-07T23:48:46.164Z","updatedAt":"2019-11-15T16:36:54.804Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":2,"locale":"en-US"},"fields":{"title":"Identity in the Real Word: the Tao of Extensibility Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/357ZCuIFXr6zoHiYpez1Jm/0db8edc99bc66baef4bf1abd698c1766/Cover_Tao_extensibility__1_.png","details":{"size":173263,"image":{"width":600,"height":856}},"fileName":"Cover_Tao_extensibility (1).png","contentType":"image/png"}}},"title":"Identity in the Real World: the Tao of Extensibility","id":"tao-of-extensibility","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:58.510Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4keIgZMN2UbAHH3qCUyWBl","type":"Asset","createdAt":"2019-10-02T14:27:59.392Z","updatedAt":"2019-11-06T11:20:30.557Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":3,"locale":"en-US"},"fields":{"title":"Credential stuffing attacks cover image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4keIgZMN2UbAHH3qCUyWBl/096bf6fc4ac007a9c3b7e4908072179d/cover_credential_stuffing_attacks_2x__1_.png","details":{"size":135643,"image":{"width":600,"height":856}},"fileName":"cover_credential stuffing attacks@2x (1).png","contentType":"image/png"}}},"title":"Credential Stuffing Attacks: What Are They and How to Combat Them","id":"credential-stuffing-attacks","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:58.161Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7BcLi7u0wswegUGb3l6vwu","type":"Asset","createdAt":"2020-08-06T17:29:51.802Z","updatedAt":"2020-08-06T17:33:20.407Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Resources Page Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7BcLi7u0wswegUGb3l6vwu/719e1b25d5c3173eda70ab4d4c21028e/Resources_Page__Cover__1_.jpeg","details":{"size":37088,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1).jpeg","contentType":"image/jpeg"}}},"title":"Forrester Now Tech: Customer Identity And Access Management (CIAM)","id":"forrester-now-tech-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:57.850Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Ji7zxEvCro71nHdWiybtX","type":"Asset","createdAt":"2020-08-04T18:45:47.298Z","updatedAt":"2020-08-04T18:45:47.298Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"SC Media Demystifying IAM in the Cloud","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Ji7zxEvCro71nHdWiybtX/585070c890674a45781a82f8abff6dc9/SC_Media_Demystifying_IAM_in_the_Cloud.jpeg","details":{"size":87779,"image":{"width":600,"height":856}},"fileName":"SC Media_Demystifying IAM in the Cloud.jpeg","contentType":"image/jpeg"}}},"title":"SC Media Special Report: Demystifying IAM in the Cloud","id":"demystifying-iam-in-the-cloud","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:57.420Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4OzfRKMFemQlsI3kLUmm8J","type":"Asset","createdAt":"2020-03-20T01:06:47.359Z","updatedAt":"2020-03-20T01:06:47.360Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Mistakes GCImage (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4OzfRKMFemQlsI3kLUmm8J/eb4115a5b726c93bde9ba97493adf19c/Mistakes_GCImage__1_.jpeg","details":{"size":85174,"image":{"width":600,"height":856}},"fileName":"Mistakes_GCImage (1).jpeg","contentType":"image/jpeg"}}},"title":"Mistakes to Love: A Survey of Identity Mistakes","id":"mistakes-to-love-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:57.112Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5e9g6DWwy6mY80sThGUai3","type":"Asset","createdAt":"2020-01-18T19:56:33.263Z","updatedAt":"2020-01-18T19:56:33.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":1,"locale":"en-US"},"fields":{"title":"Mistakes to Love: A Survey of Identity Mistakes","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5e9g6DWwy6mY80sThGUai3/2cc998b6b170e4dcd2513980e5505806/Cover_mistakes_WP.png","details":{"size":161156,"image":{"width":600,"height":856}},"fileName":"Cover_mistakes_WP.png","contentType":"image/png"}}},"title":"Mistakes to Love: A Survey of Identity Mistakes","id":"mistakes-survey-auth0","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:56.725Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2jcQ9WFhOmE8CClxBJFpDK","type":"Asset","createdAt":"2020-08-25T22:43:25.529Z","updatedAt":"2020-08-25T22:43:25.529Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2jcQ9WFhOmE8CClxBJFpDK/bc7029fbbf6dd7cef1488df96a5f7737/Resources_Page__Cover__1_.png","details":{"size":37051,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1).png","contentType":"image/png"}}},"title":"What You Need to Know About Credential Stuffing Attacks","id":"real-time-credential-stuffing-attack","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:56.301Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3B6IIqR0UruULvdzPdV92v","type":"Asset","createdAt":"2020-08-28T21:22:57.050Z","updatedAt":"2020-08-28T21:34:43.331Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Resources Page Cover (1) (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3B6IIqR0UruULvdzPdV92v/caf3921a2cb42f4989b45ea8a704e2a8/Resources_Page__Cover__1___1_.jpeg","details":{"size":46841,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1) (1).jpeg","contentType":"image/jpeg"}}},"title":"IAM as a Catalyst for Digital Transformation","id":"iam-catalyst-dt","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:55.893Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"QqdYfFK2K39lGtihxKSzW","type":"Asset","createdAt":"2020-09-20T20:27:48.568Z","updatedAt":"2020-09-20T20:27:48.568Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Fixing Broken Authentication Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/QqdYfFK2K39lGtihxKSzW/c27875355feb52e97269cfa1e34cc437/BrokenAuth_ResourcesPage_CoverWeb.jpeg","details":{"size":59769,"image":{"width":600,"height":856}},"fileName":"BrokenAuth_ResourcesPage_CoverWeb.jpeg","contentType":"image/jpeg"}}},"title":"Fixing Broken Authentication","id":"broken-authentication","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:55.384Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"n84dQMNpVdSVmcWr0E0BB","type":"Asset","createdAt":"2020-05-14T17:28:55.787Z","updatedAt":"2020-05-15T17:14:22.054Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":26,"revision":2,"locale":"en-US"},"fields":{"title":"auth0-globant-CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/n84dQMNpVdSVmcWr0E0BB/b321278a3fae4a87fe7c5028acbb5cff/auth0-globant_resource-cover__1_.png","details":{"size":131654,"image":{"width":600,"height":856}},"fileName":"auth0-globant_resource-cover (1).png","contentType":"image/png"}}},"title":"How Authentication is the Gateway to your Digital Transformation","id":"digital-transformation-strategy-globant-auth0","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:55.079Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ShhEWdZqldEh3ZyiwSHoI","type":"Asset","createdAt":"2020-08-31T16:34:16.664Z","updatedAt":"2020-08-31T16:44:40.324Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"MLDWebinarupdated","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ShhEWdZqldEh3ZyiwSHoI/24f0ed847b337ec795c20c3bd2b4c75c/MLDWebinarupdated.jpeg","details":{"size":56181,"image":{"width":600,"height":856}},"fileName":"MLDWebinarupdated.jpeg","contentType":"image/jpeg"}}},"title":"The Evolution of Digital Identities, Consent, \u0026 Cookies","id":"MLD-Auth0-Evolution-of-Digital-ID-and-Consent","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:54.680Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3uDEGm8hWyipkuXfVItz16","type":"Asset","createdAt":"2020-02-27T19:57:05.595Z","updatedAt":"2020-02-27T19:58:48.517Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"siwa","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3uDEGm8hWyipkuXfVItz16/68ef23d437c3e1d5e7f1f7e1c7501090/SIWAResource__1_.jpeg","details":{"size":45702,"image":{"width":600,"height":856}},"fileName":"SIWAResource (1).jpeg","contentType":"image/jpeg"}}},"title":"Sign into the Hype","id":"sign-into-the-hype-webinar","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:54.259Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ulKxRlTjXWJZOu1On3oYo","type":"Asset","createdAt":"2020-02-26T23:17:26.160Z","updatedAt":"2020-04-20T19:27:16.421Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"centralized-identity-webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ulKxRlTjXWJZOu1On3oYo/1af305c89f9ee1897666948cfd6e2275/Resource_covers.png","details":{"size":698713,"image":{"width":600,"height":856}},"fileName":"Resource covers.png","contentType":"image/png"}}},"title":"The Power of a Centralized Identity Strategy","id":"centralized-identity-webinar","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:53.973Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"41407B1mMbwhDTHxJMRZxc","type":"Asset","createdAt":"2019-11-22T18:21:07.588Z","updatedAt":"2019-11-22T18:21:07.588Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"cover how-to-build-idaas-at-scale","file":{"url":"//images.ctfassets.net/2ntc334xpx65/41407B1mMbwhDTHxJMRZxc/e3e1da2ffa05078a75b8b7b4c8079780/cover_how-to-build-idaas-at-scale_2x.png","details":{"size":122166,"image":{"width":600,"height":856}},"fileName":"cover_how-to-build-idaas-at-scale@2x.png","contentType":"image/png"}}},"title":"Building IDaaS at Scale","id":"Building-IDaaS-at-Scale","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:53.668Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"11FqdFbhdwkyq8lhEsMQuK","type":"Asset","createdAt":"2019-10-18T15:28:39.246Z","updatedAt":"2019-11-06T11:20:15.886Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":41,"revision":4,"locale":"en-US"},"fields":{"title":"Are you ready to Sign In with Apple ID?","file":{"url":"//images.ctfassets.net/2ntc334xpx65/11FqdFbhdwkyq8lhEsMQuK/ee1515269fcea4080ca4eaf98d194b46/Cover_Are_you_ready_to_Sign_In_with_Apple_ID__2x-8__1_.png","details":{"size":48391,"image":{"width":600,"height":856}},"fileName":"Cover_Are you ready to Sign In with Apple ID_@2x-8 (1).png","contentType":"image/png"}}},"title":"Sign in with Apple","id":"sign-in-with-apple","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:52.387Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XLoTNhrVCX8Na0JABPy3g","type":"Asset","createdAt":"2019-11-05T01:32:03.363Z","updatedAt":"2019-11-05T01:32:03.363Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Cover Auth0 Enterprise Architect Cookbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4XLoTNhrVCX8Na0JABPy3g/60da648ce335f8cd17cbd83db2e85fb4/Cover_Auth0_Enterprise_Architect_Cookbook_1x.png","details":{"size":236216,"image":{"width":600,"height":856}},"fileName":"Cover_Auth0 Enterprise Architect Cookbook@1x.png","contentType":"image/png"}}},"title":"The Enterprise Architect Cookbook","id":"the-enterprise-architect-cookbook","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:51.593Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"TZ4sO8yUbKdkf4ZWh5qPd","type":"Asset","createdAt":"2019-08-30T04:58:14.753Z","updatedAt":"2019-11-06T11:20:36.287Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":31,"revision":5,"locale":"en-US"},"fields":{"title":"eBook-OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/TZ4sO8yUbKdkf4ZWh5qPd/2d0ae6cc8be199a09aa16cd8154eecae/eBook-OpenID.png","details":{"size":250842,"image":{"width":600,"height":856}},"fileName":"eBook-OpenID.png","contentType":"image/png"}}},"title":"The OpenID Connect Handbook","id":"the-openid-connect-handbook","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:18.345Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2LVgNY9eLSaSm4yQEqMS8O","type":"Asset","createdAt":"2018-03-06T15:33:36.194Z","updatedAt":"2019-11-06T11:23:22.150Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook An Introduction to E","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2LVgNY9eLSaSm4yQEqMS8O/4a5c3feec95de71fe7ce3e4f23ded592/eBook_An_Introduction_to_E.png","details":{"size":88961,"image":{"width":600,"height":856}},"fileName":"eBook_An Introduction to E.png","contentType":"image/png"}}},"title":"An Introduction to Ethereum and Smart Contracts","id":"intro-to-ethereum","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.837Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6O1ch793Z6Q2CE08ysi6q2","type":"Asset","createdAt":"2018-03-06T15:32:54.560Z","updatedAt":"2019-11-06T11:23:55.547Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook The Data Playbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6O1ch793Z6Q2CE08ysi6q2/d7c6138413ad4f0bb80b2bf011fb3e2c/eBook_The_Data_Playbook.png","details":{"size":68340,"image":{"width":600,"height":856}},"fileName":"eBook_The Data Playbook.png","contentType":"image/png"}}},"title":"The Data Playbook","id":"data-playbook","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.466Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3MD0MZc3QIWYUS6AA4s40W","type":"Asset","createdAt":"2018-03-06T15:33:38.284Z","updatedAt":"2019-11-06T11:23:21.072Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook Migration an AngularJS App","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3MD0MZc3QIWYUS6AA4s40W/3f31b54278310601552cb1fa8cd0d332/eBook_Migration_an_AngularJS_App.png","details":{"size":74666,"image":{"width":600,"height":856}},"fileName":"eBook_Migration an AngularJS App.png","contentType":"image/png"}}},"title":"Migrating an AngularJS App to Angular","id":"migrating-to-angular2","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.062Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ZJWRvwedysuiskqaake60","type":"Asset","createdAt":"2018-03-06T15:33:39.530Z","updatedAt":"2019-11-06T11:23:19.926Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook PHP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ZJWRvwedysuiskqaake60/72219d23a5bfc289887b43184434c00f/eBook_PHP.png","details":{"size":83807,"image":{"width":600,"height":856}},"fileName":"eBook_PHP.png","contentType":"image/png"}}},"title":"Migrating a PHP 5 app to PHP 7 Guide","id":"migrating-to-php7","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:04.780Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1c9zARV8seWicSWQ0Qs2YG","type":"Asset","createdAt":"2018-03-06T15:33:36.850Z","updatedAt":"2019-11-06T11:23:22.683Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook Authentification Survival Guide","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1c9zARV8seWicSWQ0Qs2YG/8bed0441c1209351aff182120a513951/eBook_Authentification_Survival_Guide.png","details":{"size":112816,"image":{"width":600,"height":856}},"fileName":"eBook_Authentification Survival Guide.png","contentType":"image/png"}}},"title":"Authentication Survival Guide","id":"authentication-survival-guide","language":"EN"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:04.073Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"19PWF4RVlbnbyUk9N6ZBWf","type":"Asset","createdAt":"2020-08-11T20:02:36.793Z","updatedAt":"2020-08-11T20:09:45.069Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Resources Page Cover (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/19PWF4RVlbnbyUk9N6ZBWf/3fb7699b28c568441129b1264fa819d3/Resources_Page__Cover__2_.jpeg","details":{"size":45959,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (2).jpeg","contentType":"image/jpeg"}}},"title":"SC Magazine Product Review: Identity and Access Management - Auth0","id":"sc-magazine-product-review-2020","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:03.637Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"17OEBGlL1kEKyFUU2GZHtQ","type":"Asset","createdAt":"2020-09-01T15:59:24.089Z","updatedAt":"2020-09-01T15:59:24.089Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Raconteur Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/17OEBGlL1kEKyFUU2GZHtQ/085ecd7f7106b0c3d5c09ad9fc9c5a8b/Resources_Page__Cover.png","details":{"size":49265,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.png","contentType":"image/png"}}},"title":"Unlocking Digital Identity Management","id":"unlocking-digital-identity-management","language":"EN"},{"type":"videos","updatedAt":"2022-09-09T03:09:03.162Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7iCMIwAnOVNfuY8aqYYlJf","type":"Asset","createdAt":"2020-09-03T15:15:51.893Z","updatedAt":"2020-09-03T15:15:51.893Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Cover (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7iCMIwAnOVNfuY8aqYYlJf/c687388e71756099146b3eda8ae8017a/Resources_Page__Cover__2_.png","details":{"size":89294,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (2).png","contentType":"image/png"}}},"title":"Bot Detection Overview and Video","id":"bot-detection-demo-video","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:02.742Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4v8iVMpoHC8cSsUKIQgUow","type":"Asset","createdAt":"2018-03-06T15:32:41.795Z","updatedAt":"2019-11-06T11:24:06.893Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Webinars Introduction to OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4v8iVMpoHC8cSsUKIQgUow/eafc1addfe7a1831a84d1a3adfe5ee51/Webinars_Introduction_to_OpenID.png","details":{"size":222532,"image":{"width":600,"height":856}},"fileName":"Webinars_Introduction to OpenID.png","contentType":"image/png"}}},"title":"Intro to OpenID Connect","id":"intro-openid-connect","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:02.043Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3NvGJupnpMWI7qTr7Kcp1i","type":"Asset","createdAt":"2020-04-27T17:03:02.485Z","updatedAt":"2020-04-27T22:38:14.390Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":4,"locale":"en-US"},"fields":{"title":"make-remote-work-ci","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3NvGJupnpMWI7qTr7Kcp1i/d23161610bbb60f34c8d5d84e3bc8c74/MakeRemoteWorkGC2.jpeg","details":{"size":54964,"image":{"width":600,"height":856}},"fileName":"MakeRemoteWorkGC2.jpeg","contentType":"image/jpeg"}}},"title":"Make Remote Work","id":"make-remote-work-webinar","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:01.620Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3MqOmALQ7kTdKlzFsUcSec","type":"Asset","createdAt":"2020-09-22T23:46:53.263Z","updatedAt":"2020-09-22T23:46:53.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Attract and Retain More customers with CIAM Tech Resources cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3MqOmALQ7kTdKlzFsUcSec/c266260699e339777581af8b428c33f0/Resources_Page__Cover__2_.jpeg","details":{"size":72728,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (2).jpeg","contentType":"image/jpeg"}}},"title":"Attract and Retain More Customers with CIAM Technology","id":"attract-and-retain-more-customers-with-ciam-technology","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:01.200Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XmhksW14yGiIHoIa81NU4","type":"Asset","createdAt":"2020-09-10T22:36:20.013Z","updatedAt":"2020-09-10T23:01:38.786Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"B2Bdemo","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2XmhksW14yGiIHoIa81NU4/308a9060b1292d13eb27acd9127771eb/B2Bdemo__1_.jpeg","details":{"size":52105,"image":{"width":600,"height":856}},"fileName":"B2Bdemo (1).jpeg","contentType":"image/jpeg"}}},"title":"Live Demo: Auth0 for B2B Identity Management","id":"auth0-b2b-identity-management-demo","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:09:00.793Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"Kd8bVIRyuGXLNzYXbR9w5","type":"Asset","createdAt":"2020-09-21T17:30:45.212Z","updatedAt":"2020-09-21T19:02:44.908Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"locale":"en-US"},"fields":{"title":"Cover AWS","file":{"url":"//images.ctfassets.net/2ntc334xpx65/Kd8bVIRyuGXLNzYXbR9w5/f96160df740035314dffcd227ae63c96/AWS_600x856.png","details":{"size":64724,"image":{"width":600,"height":856}},"fileName":"AWS_600x856.png","contentType":"image/png"}}},"title":"App Identity on AWS","id":"aws","language":"EN"},{"type":"webinars","updatedAt":"2022-09-09T03:09:00.434Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4p61xqyh7fF4vxOUJ6fTpZ","type":"Asset","createdAt":"2020-04-28T23:50:02.640Z","updatedAt":"2020-04-28T23:50:02.640Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"locale":"en-US"},"fields":{"title":"CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4p61xqyh7fF4vxOUJ6fTpZ/e81845d7090e54209403800c76a0bbed/webnar_anatomy_cred_stuffing_cover__1_.png","details":{"size":175351,"image":{"width":600,"height":856}},"fileName":"webnar_anatomy_cred_stuffing_cover (1).png","contentType":"image/png"}}},"title":"The Anatomy of a Credential Stuffing Attack","id":"credential-stuffing-attack-webinar","language":"EN"},{"type":"whitepapers","updatedAt":"2022-09-09T03:00:54.365Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"HEzd0GKeiWmWcOIIaW0cY","type":"Asset","createdAt":"2018-03-27T18:19:48.442Z","updatedAt":"2019-11-06T11:22:04.558Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 blurs the line between IDaas and CIAM","description":"451 Research: Auth0 blurs the line between IDaaS and CIAM ","file":{"url":"//images.ctfassets.net/2ntc334xpx65/HEzd0GKeiWmWcOIIaW0cY/d0298b1e306bfcdf5680402f10634979/Whitepaper_Auth0_blurs_the_line_between_IDaas_and_CIAM.png","details":{"size":401591,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Auth0 blurs the line between IDaas and CIAM.png","contentType":"image/png"}}},"title":"Auth0 blurs the line between IDaaS and CIAM","id":"451-research","language":"EN"},{"type":"webinars","updatedAt":"2022-01-27T21:12:12.549Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5eebZw9vVE7mHzS9ugno0A","type":"Asset","createdAt":"2022-01-27T20:55:13.476Z","updatedAt":"2022-01-27T20:56:37.368Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"How login can protect accounts from phishing and credential threat","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5eebZw9vVE7mHzS9ugno0A/78ac7d088450b0250e1d9896e07574ce/WWpass_Webinar_Cover.jpeg","details":{"size":58470,"image":{"width":600,"height":856}},"fileName":"WWpass Webinar Cover.jpeg","contentType":"image/jpeg"}}},"title":"How login can protect accounts from phishing and credential threat","id":"wwpass-auth0-joint-webinar","language":"EN"},{"type":"webinars","updatedAt":"2021-12-01T18:46:46.329Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3O3M1mSU6A8UGKSmiscic4","type":"Asset","createdAt":"2018-04-16T20:12:17.424Z","updatedAt":"2019-11-06T11:21:54.367Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":3,"locale":"en-US"},"fields":{"title":"Architecture and Identity Part 1 cover image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3O3M1mSU6A8UGKSmiscic4/3a57f8b8ddc7e59faceb3553bdd010e7/Architecture_and_Identity_I__1_.png","details":{"size":302791,"image":{"width":600,"height":856}},"fileName":"Architecture and Identity I (1).png","contentType":"image/png"}}},"title":"Architecture \u0026 Identity Part I: 3 IAM Examples","id":"3-iam-examples","language":"EN"},{"type":"ebooks","updatedAt":"2021-07-22T17:22:30.775Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3xWm3m87oTkOAtb2DBVMTJ","type":"Asset","createdAt":"2021-07-22T17:08:47.554Z","updatedAt":"2021-07-22T17:08:47.554Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Building Constituent Trust","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3xWm3m87oTkOAtb2DBVMTJ/ae1167ce8b51a31b7b289b51cc47a1ac/_Landing_Page__Gated_Content___Logo__625x892px__GovTech_Infographic.jpeg","details":{"size":135191,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content + Logo (625x892px)_GovTech_Infographic.jpeg","contentType":"image/jpeg"}}},"title":"Infographic: Building Constituent Trust","id":"govtech-building-constituent-trust-infographic","language":"EN"},{"type":"webinars","updatedAt":"2021-05-13T23:21:59.403Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2NAfTAptD24qwSMa2ga4yC","type":"Asset","createdAt":"2018-03-12T14:41:07.235Z","updatedAt":"2019-11-06T11:22:12.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":2,"locale":"en-US"},"fields":{"title":"Jobs to be done","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2NAfTAptD24qwSMa2ga4yC/6e35c49a62854750216ad1cd85daf81b/webinars_jted.png","details":{"size":234229,"image":{"width":600,"height":856}},"fileName":"webinars_jted.png","contentType":"image/png"}}},"title":"The Jobs-to-be-Done (JTBD) Framework","id":"the-jobs-to-be-done-framework","language":"EN"},{"type":"podcasts","updatedAt":"2021-05-05T23:34:56.191Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Tk4bd6cfSLWHUyxWhRpvG","type":"Asset","createdAt":"2021-05-05T23:34:52.969Z","updatedAt":"2021-05-05T23:34:52.969Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"ID Unlocked - Vittorio","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5Tk4bd6cfSLWHUyxWhRpvG/121add9c9b379c98aec60382ebef453b/-Landing_Page-_Podcast__625x892px_.jpeg","details":{"size":73079,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Podcast (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"JWT Profile for OAuth 2.0 Access Tokens with Vittorio Bertocci","id":"S2E008IDUnlocked","language":"EN"},{"type":"ebooks","updatedAt":"2021-05-04T20:17:17.159Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7BefsBcVaSrOcuw66Xu1K1","type":"Asset","createdAt":"2021-05-03T21:24:06.223Z","updatedAt":"2021-05-03T21:41:13.119Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"gartner-cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7BefsBcVaSrOcuw66Xu1K1/62837a4a73dd00d9ed1978fed8c7d83a/gartner-thumbnail-v3.jpg","details":{"size":80391,"image":{"width":600,"height":856}},"fileName":"gartner-thumbnail-v3.jpg","contentType":"image/jpeg"}}},"title":"Voice of the Customer: Access Management","id":"gartner-peer-insights-ciam","language":"EN"},{"type":"podcasts","updatedAt":"2021-04-19T16:01:20.959Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4X47OlIa7pAYneh3iqaljb","type":"Asset","createdAt":"2021-04-19T16:00:58.889Z","updatedAt":"2021-04-19T16:00:58.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Sam and George","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4X47OlIa7pAYneh3iqaljb/2d12c8b1fa39b0acdc7ab94c5066b1de/Resource_Image__Identity_Unlocked.jpeg","details":{"size":76711,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked.jpeg","contentType":"image/jpeg"}}},"title":"Browser Changes on Identity Protocols with Sam Goto \u0026 George Fletcher","id":"S2E007IDUnlocked","language":"EN"},{"type":"videos","updatedAt":"2021-04-15T12:34:17.811Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1GqkrpzMtaeqgG84Igm28s","type":"Asset","createdAt":"2018-03-06T15:33:46.472Z","updatedAt":"2019-11-06T11:23:12.247Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Auth0 Explainer Video","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1GqkrpzMtaeqgG84Igm28s/f2e338be1d459113258c364c318bf03c/Video_Auth0_Explainer_Video.png","details":{"size":354423,"image":{"width":600,"height":856}},"fileName":"Video_Auth0 Explainer Video.png","contentType":"image/png"}}},"title":"Auth0 Explainer Video","id":"auth0-explainer-video","language":"EN"},{"type":"podcasts","updatedAt":"2021-04-14T14:21:58.453Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"wHEyTS2uJnwnhQYk2YXXw","type":"Asset","createdAt":"2021-04-14T14:21:44.383Z","updatedAt":"2021-04-14T14:21:44.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity, Unlocked - Darin McAdams","file":{"url":"//images.ctfassets.net/2ntc334xpx65/wHEyTS2uJnwnhQYk2YXXw/f73b6e345a7efd7d1c9e791418b07ea5/Resource_Image__Identity_Unlocked__1_.jpeg","details":{"size":66556,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (1).jpeg","contentType":"image/jpeg"}}},"title":"FastFed with Darin McAdams","id":"S2E006IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2021-03-08T15:38:02.718Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"17nxYUuNjot6HjtXkOCsnJ","type":"Asset","createdAt":"2021-03-08T15:37:54.472Z","updatedAt":"2021-03-08T15:37:54.472Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity, Unlocked - Mark Haine","file":{"url":"//images.ctfassets.net/2ntc334xpx65/17nxYUuNjot6HjtXkOCsnJ/e2ab111f72a8a16a31d368ec5d8863e4/Resource_Image__Identity_Unlocked__3_.jpeg","details":{"size":68234,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (3).jpeg","contentType":"image/jpeg"}}},"title":"eKYC with Mark Haine","id":"S2E004IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2021-03-02T02:51:47.393Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2yudlMx5El9mNZHLCDGo1Q","type":"Asset","createdAt":"2021-03-02T02:51:42.543Z","updatedAt":"2021-03-02T02:51:42.543Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Tim \u0026 Atul","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2yudlMx5El9mNZHLCDGo1Q/8f09f09bfbdfc6a418c039c02c4814ef/Resource_Image__Identity_Unlocked__2_.jpeg","details":{"size":71668,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (2).jpeg","contentType":"image/jpeg"}}},"title":"CAEP with Tim Cappalli and Atul Tulshibagwale","id":"S2E003IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2021-02-18T15:56:28.207Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2V9BwlukNc0NGdz440xK7N","type":"Asset","createdAt":"2021-02-18T15:55:21.873Z","updatedAt":"2021-02-18T15:55:21.873Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Filip Skokan","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2V9BwlukNc0NGdz440xK7N/ff61320fa728f2e44a73f93d1b4a9666/Resource_Image__Identity_Unlocked__1_.jpeg","details":{"size":64288,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (1).jpeg","contentType":"image/jpeg"}}},"title":"PAR, RAR, and JAR with Filip Skokan","id":"S2E002IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2021-02-01T13:33:19.475Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"aPf6Qgu536FvazT7qzz4l","type":"Asset","createdAt":"2021-02-01T13:32:59.709Z","updatedAt":"2021-02-01T13:32:59.709Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - FAPI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/aPf6Qgu536FvazT7qzz4l/80160eb6ab399689045bfbcef6e76808/Resource_Image__Identity_Unlocked.jpeg","details":{"size":66807,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked.jpeg","contentType":"image/jpeg"}}},"title":"Exploring Financial-Grade API (FAPI) with Torsten","id":"S2E001IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-12-21T17:54:42.595Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4cKYhtbUml1zJbfipTMsAp","type":"Asset","createdAt":"2020-12-21T17:54:24.815Z","updatedAt":"2020-12-21T17:54:24.815Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Dick Hardt","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4cKYhtbUml1zJbfipTMsAp/885fc06efe1a68cb5ba0e1f09f81ac4b/Resource_Image__Identity_Unlocked__2_.jpeg","details":{"size":67616,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (2).jpeg","contentType":"image/jpeg"}}},"title":"SignIn.org and the Genesis of the GNAP Working Group","id":"S1E006IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-11-20T18:01:39.095Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2EKggWDnRSNdhcawVXSfLH","type":"Asset","createdAt":"2020-11-20T18:01:35.847Z","updatedAt":"2020-11-20T18:01:35.847Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - John Bradley","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2EKggWDnRSNdhcawVXSfLH/99702e9631addae0c087ca77433f6cdf/Resource_Image__Identity_Unlocked__1_.jpeg","details":{"size":839675,"image":{"width":3505,"height":5000}},"fileName":"Resource Image_ Identity Unlocked (1).jpeg","contentType":"image/jpeg"}}},"title":"WebAuthn and FIDO2 with John Bradley","id":"S1E005IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-11-20T17:53:04.840Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4I4MHNAPu6jFoqxzzAEmFW","type":"Asset","createdAt":"2020-11-20T17:52:55.819Z","updatedAt":"2020-11-20T17:52:55.819Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Daniel Fett","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4I4MHNAPu6jFoqxzzAEmFW/4b071bd3f64827c59b258828848d6b97/Resource_Image__Identity_Unlocked.jpeg","details":{"size":829433,"image":{"width":3505,"height":5000}},"fileName":"Resource Image_ Identity Unlocked.jpeg","contentType":"image/jpeg"}}},"title":"A Lap Around the OAuth2 Security BCP with Daniel Fett","id":"S1E004IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-10-23T16:46:16.959Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5pOoyaYa5mFnos0j5WUrnJ","type":"Asset","createdAt":"2020-08-17T19:29:20.356Z","updatedAt":"2020-10-02T11:13:35.746Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Brian Campbell","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5pOoyaYa5mFnos0j5WUrnJ/5ccb112bf4ecfd24f0e0ccd103cd03b0/Resource_Image__Identity_Unlocked.png","details":{"size":39745,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked.png","contentType":"image/png"}}},"title":"OAuth2 Sender Constraint Support: DPoP and MTLS with Brian Campbell","id":"S1E001IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-10-23T16:10:20.788Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"KwJT7bcPUKhMg6mAjPP0w","type":"Asset","createdAt":"2020-10-13T12:22:32.757Z","updatedAt":"2020-10-13T12:22:32.757Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Unlocked - Aaron Parecki","file":{"url":"//images.ctfassets.net/2ntc334xpx65/KwJT7bcPUKhMg6mAjPP0w/42ae3d158e1bc4566cd45e35e8a84496/Resource_Image__Identity_Unlocked__1_.png","details":{"size":41664,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (1).png","contentType":"image/png"}}},"title":"What's new with OAuth2.1 with Aaron Parecki","id":"S1E002IDUnlocked","language":"EN"},{"type":"podcasts","updatedAt":"2020-10-23T16:10:02.501Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"61FgXZyFnsC8OUkBkaKeoM","type":"Asset","createdAt":"2020-10-14T14:08:27.250Z","updatedAt":"2020-10-14T14:08:27.250Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Standards with Pamela Dingle","file":{"url":"//images.ctfassets.net/2ntc334xpx65/61FgXZyFnsC8OUkBkaKeoM/fe4d7afa8e7bc92820b7a656ce2843c3/Resource_Image__Identity_Unlocked__2_.png","details":{"size":39956,"image":{"width":600,"height":856}},"fileName":"Resource Image_ Identity Unlocked (2).png","contentType":"image/png"}}},"title":"The Importance of Identity Standards with Pamela Dingle","id":"S1E003IDUnlocked","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T18:07:38.318Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"sgSTuxd732okiogOyegIO","type":"Asset","createdAt":"2018-03-06T15:33:50.176Z","updatedAt":"2019-11-06T11:23:09.947Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Learn how to use Auth0 Rules","file":{"url":"//images.ctfassets.net/2ntc334xpx65/sgSTuxd732okiogOyegIO/e280bfffd9b82d5c2801cfd687867549/Video_Learn_how_to_use_Auth0_Rules.png","details":{"size":343512,"image":{"width":600,"height":856}},"fileName":"Video_Learn how to use Auth0 Rules.png","contentType":"image/png"}}},"title":"Learn how to use Auth0 Rules","id":"learn-how-to-use-auth0-rules","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T18:06:51.363Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2qP9v7eSEkS28AQqQoOkIk","type":"Asset","createdAt":"2018-03-06T15:33:48.392Z","updatedAt":"2019-11-06T11:23:00.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Learn how to integrate Passwordless Auth with Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2qP9v7eSEkS28AQqQoOkIk/a0d33373092c27a7ce4756c5f6e1935a/Video_Learn_how_to_integrate_Passwordless_Auth_with_Auth0.png","details":{"size":196443,"image":{"width":600,"height":856}},"fileName":"Video_Learn how to integrate Passwordless Auth with Auth0.png","contentType":"image/png"}}},"title":"Learn how to integrate Passwordless Auth with Auth0","id":"learn-how-to-integrate-passwordless-auth-with-auth0","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T18:05:00.668Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2tFCcvZMd2ueQSyISKYKcG","type":"Asset","createdAt":"2018-03-06T15:33:49.480Z","updatedAt":"2019-11-06T11:23:02.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Guardian Multifactor Authentication 101","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2tFCcvZMd2ueQSyISKYKcG/9878fb1dfff456eb557f5730eee4d58e/Video_Guardian_Multifactor_Authentication_101.png","details":{"size":163641,"image":{"width":600,"height":856}},"fileName":"Video_Guardian Multifactor Authentication 101.png","contentType":"image/png"}}},"title":"Guardian Multifactor Authentication 101","id":"learn-about-guardian-mfa","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T18:04:11.557Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"R4ER7JQWEm2SoKeAEy26Q","type":"Asset","createdAt":"2018-03-06T15:33:47.095Z","updatedAt":"2019-11-06T11:23:11.735Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Breached Password Detection 101","file":{"url":"//images.ctfassets.net/2ntc334xpx65/R4ER7JQWEm2SoKeAEy26Q/b25f6ccd1b8fd0fb393801ff253a7b87/Video_Breached_Password_Detection_101.png","details":{"size":180177,"image":{"width":600,"height":856}},"fileName":"Video_Breached Password Detection 101.png","contentType":"image/png"}}},"title":"Breached Password Detection 101","id":"learn-about-breached-password-detection","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T18:03:24.888Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1OHGCWfnUM8wUWEC0kQ2wU","type":"Asset","createdAt":"2018-03-06T15:33:50.956Z","updatedAt":"2019-11-06T11:23:10.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Implementing SAML as easily as Social Logins","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1OHGCWfnUM8wUWEC0kQ2wU/c975fa66c5c7edd356fde799c23615ce/Video_Implementing_SAML_as_easily_as_Social_Logins.png","details":{"size":292002,"image":{"width":600,"height":856}},"fileName":"Video_Implementing SAML as easily as Social Logins.png","contentType":"image/png"}}},"title":"Implementing SAML as easily as Social Logins","id":"implementing-saml-as-easily-as-social-logins","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T17:59:20.074Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3xJvWLnqZiSYgEGwGmGc2W","type":"Asset","createdAt":"2018-03-06T15:33:44.413Z","updatedAt":"2019-11-06T11:23:16.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Auth0 Developer Overview","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3xJvWLnqZiSYgEGwGmGc2W/72c2e7a434f09bfe2743b292a30d947b/Video_Auth0_Developer_Overview.png","details":{"size":315263,"image":{"width":600,"height":856}},"fileName":"Video_Auth0 Developer Overview.png","contentType":"image/png"}}},"title":"Auth0 Developer Overview","id":"auth0-developer-overview","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T17:58:22.046Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"o92k0m7rUsyym4ymCGk2w","type":"Asset","createdAt":"2018-03-06T15:33:52.229Z","updatedAt":"2019-11-06T11:23:08.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Understanding Session and Cookies","file":{"url":"//images.ctfassets.net/2ntc334xpx65/o92k0m7rUsyym4ymCGk2w/754753479706b1aa66802da615eeae39/Video_Understanding_Session_and_Cookies.png","details":{"size":294991,"image":{"width":600,"height":856}},"fileName":"Video_Understanding Session and Cookies.png","contentType":"image/png"}}},"title":"Understanding Session and Cookies","id":"understanding-session-and-cookies","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T17:52:17.238Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2xl1B2vmHui2A2SeqA0MqK","type":"Asset","createdAt":"2018-03-06T15:33:48.071Z","updatedAt":"2019-11-06T11:23:11.096Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video JWTs 101","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2xl1B2vmHui2A2SeqA0MqK/08adf7326faee426ce0bb62109571e1d/Video_JWTs_101.png","details":{"size":301088,"image":{"width":600,"height":856}},"fileName":"Video_JWTs 101.png","contentType":"image/png"}}},"title":"JWTs 101","id":"jwt-101","language":"EN"},{"type":"videos","updatedAt":"2020-10-14T17:51:12.817Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"70Zt1Kw2UoyUGwYwOyAMoi","type":"Asset","createdAt":"2018-12-13T13:55:27.249Z","updatedAt":"2019-11-06T11:21:13.521Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Video Solutions Demo B2C (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/70Zt1Kw2UoyUGwYwOyAMoi/d685b0ae76be381726647b43c3c54244/Video_Solutions_Demo_B2C.png","details":{"size":172656,"image":{"width":600,"height":856}},"fileName":"Video_Solutions_Demo_B2C.png","contentType":"image/png"}}},"title":"Solution Demo B2C","id":"b2c-solution-demo","language":"EN"},{"type":"videos","updatedAt":"2020-10-13T23:28:53.950Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7M8McJbkTCWayMIQiYssg0","type":"Asset","createdAt":"2018-03-06T15:32:31.537Z","updatedAt":"2019-11-06T11:24:17.831Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepaper The Total Economic Impact of Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7M8McJbkTCWayMIQiYssg0/0eaccf14ccd24995a7b258a70ce2ec87/Whitepaper_The_Total_Economic_Impact_of_Auth0.png","details":{"size":72097,"image":{"width":600,"height":856}},"fileName":"Whitepaper_The Total Economic Impact of Auth0.png","contentType":"image/png"}}},"title":"Forrester | Total Economic Impact of Auth0 Summary Video","id":"forrester-total-economic-impact-auth0-summary-video","language":"EN"},{"type":"webinars","updatedAt":"2020-09-30T21:09:47.617Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XfKcgkIs0QU8GkEGMEAkK","type":"Asset","createdAt":"2018-03-06T15:32:28.525Z","updatedAt":"2019-11-06T11:24:20.120Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepapers 451 Research Risks Posed by Legacy Authentication","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2XfKcgkIs0QU8GkEGMEAkK/62720c7e5fd969598071e247e8518401/Whitepapers_451_Research__Risks_Posed_by_Legacy_Authentication.png","details":{"size":379561,"image":{"width":600,"height":856}},"fileName":"Whitepapers_451 Research_ Risks Posed by Legacy Authentication.png","contentType":"image/png"}}},"title":"Risks Posed by Legacy Authentication","id":"risks-posed-by-legacy-authentication","language":"EN"},{"type":"webinars","updatedAt":"2020-09-29T22:55:13.976Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13aNOPrNYMEmW2kwcCAqeW","type":"Asset","createdAt":"2018-03-06T15:32:42.221Z","updatedAt":"2019-11-06T11:24:08.462Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Webinars Legacy Authentification Is Not","file":{"url":"//images.ctfassets.net/2ntc334xpx65/13aNOPrNYMEmW2kwcCAqeW/ec020c4c260d0761a4b046e4140506c5/Webinars_Legacy_Authentification_Is_Not.png","details":{"size":318007,"image":{"width":600,"height":856}},"fileName":"Webinars_Legacy Authentification Is Not.png","contentType":"image/png"}}},"title":"Legacy Authentication Is Not Enough","id":"legacy-authentication-is-not-enough","language":"EN"},{"type":"videos","updatedAt":"2020-09-29T18:33:57.683Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3xKc89UYXYgEIyqosYYuc8","type":"Asset","createdAt":"2018-03-06T15:33:51.584Z","updatedAt":"2019-11-06T11:23:09.384Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Video Passwordless Explainer Video","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3xKc89UYXYgEIyqosYYuc8/49f1f864a1f7f02b9cd75b4ad19ed38c/Video_Passwordless_Explainer_Video.png","details":{"size":154133,"image":{"width":600,"height":856}},"fileName":"Video_Passwordless Explainer Video.png","contentType":"image/png"}}},"title":"Passwordless Explainer Video","id":"passwordless-explainer-video","language":"EN"},{"type":"whitepapers","updatedAt":"2024-08-28T08:23:05.567Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6jfDRlIqkBMtUK1gMnlR6p","type":"Asset","createdAt":"2022-08-03T18:12:08.514Z","updatedAt":"2022-08-03T18:13:12.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】GABA様","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6jfDRlIqkBMtUK1gMnlR6p/8876bf1f22c3009d3b3d9b231ce39ac3/JP-Cover-Edit.png","details":{"size":299475,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit.png","contentType":"image/png"}}},"title":"【Auth0導入事例】GABA様","id":"gaba-case-study-jp","language":"JP"},{"type":"webinars","updatedAt":"2023-05-09T14:44:46.995Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5RD54TmyQPpqpa0aJIW1g4","type":"Asset","createdAt":"2023-04-20T14:37:55.977Z","updatedAt":"2023-04-20T14:38:25.795Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5RD54TmyQPpqpa0aJIW1g4/9a61f66cfcfa78f37297f261082cade8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":145192,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","id":"es-ist-doch-nur-eine-login-box-kaufen-oder-selbst-machen","language":"DE"},{"type":"webinars","updatedAt":"2023-05-08T14:02:39.323Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1HpH6l1EN8OGYQddsWKQ5k","type":"Asset","createdAt":"2023-04-26T17:33:11.446Z","updatedAt":"2023-04-26T17:33:11.446Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Sicherheit oder Nutzerfreundlichkeit?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1HpH6l1EN8OGYQddsWKQ5k/9c69190b0ee8ac92bd20ad70a0ab4271/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":141187,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Sicherheit oder Nutzerfreundlichkeit?","id":"sicherheit-oder-nutzerfreundlichkeit","language":"DE"},{"type":"whitepapers","updatedAt":"2022-12-14T00:14:58.492Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HhAd9yNPRoOrnOShb1izR","type":"Asset","createdAt":"2022-09-21T14:09:06.438Z","updatedAt":"2022-09-21T14:10:31.760Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2022 State of Secure Identity Report","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HhAd9yNPRoOrnOShb1izR/22c192e2f0378941e9b4196d7f919f22/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":103715,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"2022 State of Secure Identity Report (JP)","id":"2022-state-of-secure-identity-report-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-11-30T17:14:23.108Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3IjjCMSNVJHJ3TOXhXhWEh","type":"Asset","createdAt":"2022-11-08T15:40:28.516Z","updatedAt":"2022-11-10T18:49:35.970Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":5,"locale":"en-US"},"fields":{"title":"Wie Sie Ihre CIAM-Lösung auswählen","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3IjjCMSNVJHJ3TOXhXhWEh/707dd8ed7eb630abf65e7a132a7f6d04/-Google_Docs-_Whitepaper__Letter_size___1_.jpeg","details":{"size":129893,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Whitepaper (Letter size) (1).jpeg","contentType":"image/jpeg"}}},"title":"Wie Sie Ihre CIAM-Lösung auswählen","id":"ciam-buyers-guide-de","language":"DE"},{"type":"whitepapers","updatedAt":"2022-11-14T23:18:21.465Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3UhP2QJh3QWYyzpujJuNbk","type":"Asset","createdAt":"2022-11-14T22:59:13.574Z","updatedAt":"2022-11-14T22:59:13.574Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Relatório Estado da identidade segura 2022","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3UhP2QJh3QWYyzpujJuNbk/91912986d299b5c070a57b3ae64ba1c5/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":104873,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Relatório Estado da identidade segura 2022","id":"2022-state-of-secure-identity-report-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-11-14T22:43:39.217Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"38zSEj59RKIdh2CJLaR5tL","type":"Asset","createdAt":"2022-11-14T22:41:42.053Z","updatedAt":"2022-11-14T22:41:42.053Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Informe Estado de la identidad segura 2022","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/38zSEj59RKIdh2CJLaR5tL/8fba3685bc0608c198ae64cd3a1a98c8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":104149,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Informe Estado de la identidad segura 2022","id":"2022-state-of-secure-identity-report-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-11-08T22:05:06.509Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3AGGoB4iHi5kvxwhwF0w69","type":"Asset","createdAt":"2022-11-08T21:52:24.517Z","updatedAt":"2022-11-08T21:52:24.517Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Como escolher sua solução de CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3AGGoB4iHi5kvxwhwF0w69/0200a0da4ed120a79feced3259db7c8a/Portuguese_tall_CIAM_JPEG.jpeg","details":{"size":143610,"image":{"width":600,"height":856}},"fileName":"Portuguese tall CIAM JPEG.jpeg","contentType":"image/jpeg"}}},"title":"Como escolher sua solução de CIAM","id":"ciam-buyers-guide-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-11-08T21:34:16.955Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"52qNI5FYtx3FYmD22N1pgX","type":"Asset","createdAt":"2022-11-08T21:17:00.599Z","updatedAt":"2022-11-10T18:47:49.379Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":5,"locale":"en-US"},"fields":{"title":"Cómo elegir su solución de CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/52qNI5FYtx3FYmD22N1pgX/5986a793f5f6ef6a7a3bf3c5b173a380/-Google_Docs-_Whitepaper__Letter_size_.jpeg","details":{"size":129851,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Whitepaper (Letter size).jpeg","contentType":"image/jpeg"}}},"title":"Cómo elegir su solución de CIAM","id":"ciam-buyers-guide-sp","language":"ES"},{"type":"whitepapers","updatedAt":"2022-11-08T15:59:25.944Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7KPgak9RZt6AbC6md0pf9k","type":"Asset","createdAt":"2022-11-08T15:55:17.118Z","updatedAt":"2022-11-08T15:59:17.750Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Comment choisir votre solution CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7KPgak9RZt6AbC6md0pf9k/f1c6251a3b4742c8e7182e610bcc524f/tall_french.jpeg","details":{"size":96261,"image":{"width":600,"height":856}},"fileName":"tall french.jpeg","contentType":"image/jpeg"}}},"title":"Comment choisir votre solution CIAM","id":"ciam-buyers-guide-fr","language":"FR"},{"type":"videos","updatedAt":"2022-09-10T18:06:03.956Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6Qcfi0UDZf1rHTdiyDzsIy","type":"Asset","createdAt":"2022-08-30T10:51:06.126Z","updatedAt":"2022-09-10T18:06:01.321Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"【Auth0動画】ユーザー移行","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6Qcfi0UDZf1rHTdiyDzsIy/9063ba4019f29cf1a55d26b64be63eda/auth0-thumbnail-user-migration-jp.png","details":{"size":256705,"image":{"width":600,"height":856}},"fileName":"auth0-thumbnail-user-migration-jp.png","contentType":"image/png"}}},"title":"【Auth0動画】ユーザー移行","id":"user-migration-jp","language":"JP"},{"type":"webinars","updatedAt":"2022-09-10T18:01:16.817Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2fj1wWJem6nJnOtQqhvwYD","type":"Asset","createdAt":"2022-08-19T03:49:54.138Z","updatedAt":"2022-08-19T03:49:54.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":" はじめてのAuth0 無料トライアル チュートリアル動画","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2fj1wWJem6nJnOtQqhvwYD/e7470f136c87f2609b5e4c185dbbc929/JP-Cover-Edit__14_.png","details":{"size":293641,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (14).png","contentType":"image/png"}}},"title":" はじめてのAuth0 無料トライアル チュートリアル動画","id":"signup-video-japan","language":"JP"},{"type":"webinars","updatedAt":"2022-09-10T18:01:05.436Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"789k1tE7xZMzc2YsIAviND","type":"Asset","createdAt":"2022-08-19T03:37:53.613Z","updatedAt":"2022-08-19T03:37:53.613Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"中部電力の新規事業創出を支えるID基盤","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/789k1tE7xZMzc2YsIAviND/59d325f269084cb8dffc2eef07bd9bd5/JP-Cover-Edit__13_.png","details":{"size":302750,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (13).png","contentType":"image/png"}}},"title":"中部電力の新規事業創出を支えるID基盤","id":"chuden-webinar-ondemand-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:57:17.522Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ok8DcekFQ4BiK7UiHVfTq","type":"Asset","createdAt":"2022-08-03T18:27:19.475Z","updatedAt":"2022-08-03T18:27:19.475Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】コープさっぽろ様","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ok8DcekFQ4BiK7UiHVfTq/62a945e65425f9dfac3d7905f48203e6/JP-Cover-Edit__2_.png","details":{"size":303807,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (2).png","contentType":"image/png"}}},"title":"【Auth0導入事例】コープさっぽろ様","id":"coop-sapporo-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:54:02.800Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7wkCU8Z6KTlx3qDgsITsC3","type":"Asset","createdAt":"2022-08-03T18:33:41.856Z","updatedAt":"2022-08-03T18:33:41.856Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】DMM.com様","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7wkCU8Z6KTlx3qDgsITsC3/21f4c85986b4e219162115e2e3ad230d/JP-Cover-Edit__3_.png","details":{"size":301509,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (3).png","contentType":"image/png"}}},"title":"【Auth0導入事例】DMM.com様","id":"dmm-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:52:38.269Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2PKZdeTcPtCvUVMMHUFUNa","type":"Asset","createdAt":"2022-08-03T22:57:04.766Z","updatedAt":"2022-08-03T22:57:04.766Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】コニカミノルタ様","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2PKZdeTcPtCvUVMMHUFUNa/1a60f4828baf5ff18bc92303b9afa14e/JP-Cover-Edit__5_.png","details":{"size":301021,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (5).png","contentType":"image/png"}}},"title":"【Auth0導入事例】コニカミノルタ様","id":"konica-minolta-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:52:28.741Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1uOjRpXtzhBGA2JDxHeYy9","type":"Asset","createdAt":"2022-08-03T23:12:07.959Z","updatedAt":"2022-08-03T23:12:07.959Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】北海道テレビ放送","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1uOjRpXtzhBGA2JDxHeYy9/2cb9f423172962899d89b9a6acadd53c/JP-Cover-Edit__7_.png","details":{"size":306896,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (7).png","contentType":"image/png"}}},"title":"【Auth0導入事例】北海道テレビ放送","id":"htb-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:52:17.079Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"tRTUNmiFbWGLc491qfDok","type":"Asset","createdAt":"2022-08-03T23:07:11.177Z","updatedAt":"2022-08-03T23:07:11.177Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】GVATECH株式会社","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/tRTUNmiFbWGLc491qfDok/54f39a2fbc9f6f01917260d30c36836b/JP-Cover-Edit__6_.png","details":{"size":304857,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (6).png","contentType":"image/png"}}},"title":"【Auth0導入事例】GVATECH株式会社","id":"gvatech-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:51:55.878Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZthBcf0SMAB6GSQcC5dPx","type":"Asset","createdAt":"2022-08-03T23:23:58.182Z","updatedAt":"2022-08-03T23:23:58.182Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】Qrio","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZthBcf0SMAB6GSQcC5dPx/7e9c2fe6e65ed51c75fddb08a47d840f/JP-Cover-Edit__8_.png","details":{"size":298246,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (8).png","contentType":"image/png"}}},"title":"【Auth0導入事例】Qrio","id":"qrio-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:51:42.747Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5yV6iTrPiGJf7XHtXwcfIi","type":"Asset","createdAt":"2022-08-19T02:43:40.571Z","updatedAt":"2022-09-10T17:51:38.918Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"2020年アプリケーション 開発に関する調査結果","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5yV6iTrPiGJf7XHtXwcfIi/2c42a49d7c2496af7a99398874c6e951/JP-Cover-Edit__12_.png","details":{"size":293785,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (12).png","contentType":"image/png"}}},"title":"2020年アプリケーション 開発に関する調査結果","id":"state-of-the-app-assembly-2020-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:51:13.692Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3gTHrYu5S0Pw2dCL46bz0t","type":"Asset","createdAt":"2022-08-04T00:10:36.705Z","updatedAt":"2022-08-04T00:10:36.705Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】NTT ドコモ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3gTHrYu5S0Pw2dCL46bz0t/32d52d2fa62114df1a31fb40c69e4fb0/JP-Cover-Edit__11_.png","details":{"size":298879,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (11).png","contentType":"image/png"}}},"title":"【Auth0導入事例】NTT ドコモ","id":"docomo-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:51:01.848Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7jJwX1hPV09ikWrdauWI87","type":"Asset","createdAt":"2022-08-04T00:01:12.388Z","updatedAt":"2022-08-04T00:01:12.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】経済産業省","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7jJwX1hPV09ikWrdauWI87/72a68f1eb7a6166c9eb89ef1327ccf34/JP-Cover-Edit__10_.png","details":{"size":304319,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (10).png","contentType":"image/png"}}},"title":"【Auth0導入事例】経済産業省","id":"meti-case-study-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-10T17:50:52.487Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7aF4HOhPHD6XDeuEhlThxf","type":"Asset","createdAt":"2022-08-03T23:54:36.866Z","updatedAt":"2022-08-03T23:54:36.866Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"【Auth0導入事例】中部電力","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7aF4HOhPHD6XDeuEhlThxf/40f2a9ff89f7b0aaf793428244a82f57/JP-Cover-Edit__9_.png","details":{"size":301615,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (9).png","contentType":"image/png"}}},"title":"【Auth0導入事例】中部電力","id":"chuden-case-study-jp","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:17:32.244Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ANfXbhKL7cbAcZwHPTTFT","type":"Asset","createdAt":"2022-03-10T19:29:55.141Z","updatedAt":"2022-03-10T19:29:55.141Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 e OpenID Connect: o Guia Profissional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6ANfXbhKL7cbAcZwHPTTFT/c7f38f7ea56d53cf92b8e7c8da4fa04c/OAuth2_and_OpenID_Connect_625x892px_2.jpg","details":{"size":144650,"image":{"width":600,"height":856}},"fileName":"OAuth2 and OpenID Connect_625x892px_2.jpg","contentType":"image/jpeg"}}},"title":"OAuth2 e OpenID Connect: Guia Profissional","id":"open-id-connect-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:17:10.289Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3uV6hO6L786QR8ZDSmOvqV","type":"Asset","createdAt":"2022-06-07T20:32:43.226Z","updatedAt":"2022-06-07T20:32:43.226Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Como o mercado da América Latina está impulsionando a inovação de fintech","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3uV6hO6L786QR8ZDSmOvqV/44521e4e1d099435a2c7215af07ed5d2/Resource_Cover_625x892px_How_the_latam_market_PTBR.jpg","details":{"size":155445,"image":{"width":600,"height":856}},"fileName":"Resource Cover_625x892px How the latam market PTBR.jpg","contentType":"image/jpeg"}}},"title":"Como o mercado da América Latina está impulsionando a inovação de fintech","id":"latam-driving-fintech-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:16:53.851Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5dwosZbug3lQINXrnn7CVP","type":"Asset","createdAt":"2022-06-07T18:46:48.688Z","updatedAt":"2022-06-07T18:46:48.688Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Desenvolvimento da Identidade: como a gestão de identidades de clientes pode impulsionar a conversão e a retenção?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5dwosZbug3lQINXrnn7CVP/04c01d40603f89401c15da49b992c7e7/Resource_Cover_625x892px_Building_on_identity_PT.jpg","details":{"size":185877,"image":{"width":600,"height":856}},"fileName":"Resource Cover_625x892px Building on identity PT.jpg","contentType":"image/jpeg"}}},"title":"Desenvolvimento da Identidade: gestão de identidades pode impulsionar a conversão e a retenção?","id":"building-on-identity-pt","language":"PT"},{"type":"ebooks","updatedAt":"2022-09-09T03:16:36.604Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31gazXbRVxgxfabL6FjJuB","type":"Asset","createdAt":"2022-05-26T20:06:19.157Z","updatedAt":"2022-05-26T20:06:46.365Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Autenticação após senhas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31gazXbRVxgxfabL6FjJuB/b806d9b8e981c486c7a504ed9be783fd/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v2_-_PT_Cover_625x892.png","details":{"size":96786,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v2 - PT Cover_625x892.png","contentType":"image/png"}}},"title":"Autenticação após senhas","id":"auth-after-passwords-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:16:09.814Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6rldWrUz16sf5z1Km5UC1l","type":"Asset","createdAt":"2022-03-24T22:49:17.385Z","updatedAt":"2022-03-24T22:49:17.385Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM - Equilibrar segurança e experiência do cliente","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6rldWrUz16sf5z1Km5UC1l/05cf6fd3e3eda6e32530cd703d51310b/-Landing_Page-_CIAM_-_BRPT__625x892px_.jpeg","details":{"size":178294,"image":{"width":600,"height":856}},"fileName":"-Landing Page- CIAM - BRPT (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"CIAM - Equilibrar segurança e experiência do cliente","id":"secure-ciam-pt","language":"PT"},{"type":"ebooks","updatedAt":"2022-09-09T03:15:54.573Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1VOpYe0Io4I2plznGbOdpI","type":"Asset","createdAt":"2022-03-07T21:49:31.579Z","updatedAt":"2022-03-14T22:59:58.219Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"Manual do JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1VOpYe0Io4I2plznGbOdpI/8db1a7b4412c04e42acbf1b2fd013fc0/JWT_Handbook_625x892px_FInal.jpg","details":{"size":110845,"image":{"width":600,"height":856}},"fileName":"JWT Handbook_625x892px_FInal.jpg","contentType":"image/jpeg"}}},"title":"Manual do JWT","id":"jwt-handbook-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:15:38.862Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5aQDRSfV1eM14ie0Wu48pj","type":"Asset","createdAt":"2022-03-10T19:01:43.604Z","updatedAt":"2022-03-14T19:45:53.493Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Gartner Magic Quadrant Page - Portuguese version","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5aQDRSfV1eM14ie0Wu48pj/ffadf5b79bd5db27b08fd81db3fc6ec4/Magic_Quadrant_PT.png","details":{"size":128417,"image":{"width":600,"height":856}},"fileName":"Magic Quadrant_PT.png","contentType":"image/png"}}},"title":"2021 Gartner® Quadrante Mágico para gerenciamento de acesso","id":"gartner-magic-quadrant-gerenciamento-de-acesso","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:15:20.766Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1dSyh2Zl4yfWeBt8MeuG3F","type":"Asset","createdAt":"2021-10-06T21:40:20.430Z","updatedAt":"2022-03-12T01:15:16.636Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"en-US"},"fields":{"title":" O estado da identidade segura","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1dSyh2Zl4yfWeBt8MeuG3F/785b13948fe85b5e3fb95ce3e5e1324a/-Landing_Page-_State_of_Secure_Identity_-_BRPT__625x892px_.jpeg","details":{"size":96608,"image":{"width":600,"height":856}},"fileName":"-Landing Page- State of Secure Identity - BRPT (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"O estado da identidade segura","id":"state-of-secure-identity-report-pt","language":"PT"},{"type":"ebooks","updatedAt":"2022-09-09T03:15:00.714Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"NurIk7rcHXJETyCFB9m5Z","type":"Asset","createdAt":"2021-11-20T00:49:00.695Z","updatedAt":"2022-03-12T00:40:22.966Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Infográfico: Três tipos principais de ataques","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/NurIk7rcHXJETyCFB9m5Z/2359624c5a361b2ac65cb65ee9c6defc/-Landing_Page-_3Attacks_-_BRPT__625x892px_.jpeg","details":{"size":182862,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - BRPT (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Infográfico: Os 3 principais ataques que ameaçam a segurança","id":"state-of-secure-identity-infographic-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:59.571Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"37kprS7wDA82rYMZuSXjWj","type":"Asset","createdAt":"2022-07-26T00:17:40.105Z","updatedAt":"2022-07-26T00:17:40.105Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"what-is-sso-jp-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/37kprS7wDA82rYMZuSXjWj/cea5be233dcc84860d4bc23840deeacb/what-is-sso-jp-cover.jpeg","details":{"size":95138,"image":{"width":600,"height":856}},"fileName":"what-is-sso-jp-cover.jpeg","contentType":"image/jpeg"}}},"title":"シングルサインオン(SSO)とは?メリット・仕組み・実装を解説","id":"what-is-sso-blog-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:59.163Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7v63e0Afxck3j2PhNE0WiK","type":"Asset","createdAt":"2022-07-26T00:07:46.807Z","updatedAt":"2022-07-26T00:07:46.807Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"sso-with-saml-jp-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7v63e0Afxck3j2PhNE0WiK/0fd4ba6d3c5cbc3a6cc0c1476247b32e/sso-with-saml-jp-cover.jpeg","details":{"size":103373,"image":{"width":600,"height":856}},"fileName":"sso-with-saml-jp-cover.jpeg","contentType":"image/jpeg"}}},"title":"SAML認証でシングルサインオン(SSO)を実装する方法 - 実装手順とメリットをわかりやすく解説","id":"implement-sso-with-saml-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:58.763Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"vo986AROB04CudrP5VMnd","type":"Asset","createdAt":"2022-07-25T23:47:01.020Z","updatedAt":"2022-07-25T23:47:01.020Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"signicat-marketplace-fr-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/vo986AROB04CudrP5VMnd/1d9ff1ba3307a178610b85d61958dc27/signicat-marketplace-fr-cover.jpeg","details":{"size":87232,"image":{"width":600,"height":856}},"fileName":"signicat-marketplace-fr-cover.jpeg","contentType":"image/jpeg"}}},"title":"Signicat rejoint Auth0 Marketplace pour proposer des solutions d’identité numérique de confiance","id":"signicat-joins-marketplace-fr","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:58.386Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5aLo2gtHa9GBRBuFEMSx1m","type":"Asset","createdAt":"2022-07-25T23:29:44.520Z","updatedAt":"2022-07-25T23:30:03.921Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"adaptive-mfa-fr-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5aLo2gtHa9GBRBuFEMSx1m/978d9963e6121160b6a291e74179558f/adaptive-mfa-fr-cover.jpeg","details":{"size":84837,"image":{"width":600,"height":856}},"fileName":"adaptive-mfa-fr-cover.jpeg","contentType":"image/jpeg"}}},"title":"Auth0 Lance la MFA Adaptive","id":"adaptive-mfa-blog-fr","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:58.081Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"404fGXDdn9lAXO8oFoKC3a","type":"Asset","createdAt":"2022-07-25T21:07:43.667Z","updatedAt":"2022-07-25T21:07:43.667Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"passwordless-sp-cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/404fGXDdn9lAXO8oFoKC3a/1a11d90cf02cd9d7f6856364bf2da0bf/passwordless-sp-cover.jpeg","details":{"size":90184,"image":{"width":600,"height":856}},"fileName":"passwordless-sp-cover.jpeg","contentType":"image/jpeg"}}},"title":"Nueva Función Elimina la Necesidad de Contraseñas","id":"passwordless-blog-es","language":"ES"},{"type":"webinars","updatedAt":"2022-09-09T03:08:57.725Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZIfg8rScURo2YTnfSKZAU","type":"Asset","createdAt":"2022-07-19T20:08:00.387Z","updatedAt":"2022-07-19T20:08:32.816Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"-Landing Page- Gated Content (any) (625x892px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZIfg8rScURo2YTnfSKZAU/862a0ce55e10fb44963331d75c73614f/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":89303,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Kundenerlebnis mit CIAM: reibungslos und sicher","id":"kundenerlebnis-mit-ciam-reibungslos-und-sicher","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:56.804Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ByQTawe6Hj2UVLuKqd5Wp","type":"Asset","createdAt":"2022-06-07T20:15:34.645Z","updatedAt":"2022-06-07T20:15:34.645Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Cómo el mercado latinoamericano está impulsando la innovación fintech","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ByQTawe6Hj2UVLuKqd5Wp/7056ae02b99eb46d33403e02b052f192/Resource_Cover_625x892px_How_the_latam_market_SPLA.jpg","details":{"size":153849,"image":{"width":600,"height":856}},"fileName":"Resource Cover_625x892px How the latam market SPLA.jpg","contentType":"image/jpeg"}}},"title":"Cómo el mercado latinoamericano está impulsando la innovación fintech","id":"latam-driving-fintech-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:55.874Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7DoqQ5JwDhCY2QmsW30651","type":"Asset","createdAt":"2022-06-07T17:53:02.118Z","updatedAt":"2022-06-07T17:53:25.119Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Construir la identidad: ¿cómo impulsar la conversión y la retención mediante la gestión de la identidad de los clientes? ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7DoqQ5JwDhCY2QmsW30651/1819a2673132ee4b3f2e84a187fefdf5/Resource_Cover_625x892px_Building_on_identity_SP.jpg","details":{"size":185818,"image":{"width":600,"height":856}},"fileName":"Resource Cover_625x892px Building on identity SP.jpg","contentType":"image/jpeg"}}},"title":"Construir la identidad: ¿cómo impulsar la conversión y la retención? ","id":"building-on-identity-es","language":"ES"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:55.047Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1SVoEVcD48VMgFOwHoMfhg","type":"Asset","createdAt":"2022-05-26T19:15:05.025Z","updatedAt":"2022-05-26T19:15:05.025Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticación después de contraseñas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1SVoEVcD48VMgFOwHoMfhg/13bca0bb3389d87b6d2e8a08fa6283d3/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v3_-_SP_Cover_625x892.png","details":{"size":209894,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v3 - SP Cover_625x892.png","contentType":"image/png"}}},"title":"Autenticación después de contraseñas","id":"auth-after-passwords-es","language":"ES"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:54.737Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZW2HBXqpm0pOM7YvgtW8o","type":"Asset","createdAt":"2022-05-26T18:48:40.900Z","updatedAt":"2022-05-26T18:48:40.900Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"パスワードの次の認証","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZW2HBXqpm0pOM7YvgtW8o/980996c29840e8439095d5cceb5f0355/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v1_-_JP_Cover_625x892.png","details":{"size":105978,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v1 - JP Cover_625x892.png","contentType":"image/png"}}},"title":"パスワードの次の認証","id":"auth-after-passwords-jp","language":"JP"},{"type":"webinars","updatedAt":"2022-09-09T03:08:54.458Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3myEnUHSSkbnnaREK3cGZu","type":"Asset","createdAt":"2022-05-12T22:33:39.734Z","updatedAt":"2022-05-13T15:45:05.931Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"eID: Maximales Vertrauen in einer digitalen Welt","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3myEnUHSSkbnnaREK3cGZu/9b4ec219fd583a7930229643f9fa01a3/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":88425,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"eID: Maximales Vertrauen in einer digitalen Welt","id":"eid-maximales-vertrauen-in-einer-digitalen-welt","language":"DE"},{"type":"webinars","updatedAt":"2022-09-09T03:08:54.119Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7JOzEFfdt8xQP275EyOTSI","type":"Asset","createdAt":"2022-05-02T15:38:29.946Z","updatedAt":"2022-05-02T16:24:14.753Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7JOzEFfdt8xQP275EyOTSI/822e9d65d915cb488c78d9d29643803c/hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg","details":{"size":92241,"image":{"width":600,"height":856}},"fileName":"hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg","contentType":"image/jpeg"}}},"title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","id":"hybride-moderne-authentifizierung-das-neue-normal-im-retail","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:53.638Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"WEjyg0PWgsKLxrYrWPH0E","type":"Asset","createdAt":"2022-03-18T18:13:50.300Z","updatedAt":"2022-04-26T18:52:52.619Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Manual de JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/WEjyg0PWgsKLxrYrWPH0E/37ba57cc2cfdaa1d2f103ca2d5b3dc6b/JWT_Handbook_625x892px_Spanish.jpg","details":{"size":113408,"image":{"width":600,"height":856}},"fileName":"JWT Handbook_625x892px_Spanish.jpg","contentType":"image/jpeg"}}},"title":"Manual de JWT","id":"jwt-handbook-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:53.219Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"62sfnx6OmOrSdCLhaBnSuh","type":"Asset","createdAt":"2020-03-27T02:37:27.044Z","updatedAt":"2020-03-31T21:11:06.360Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Identity in the Real World - the Tao of Extensibility JP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/62sfnx6OmOrSdCLhaBnSuh/8b3d84a161ebcae7cb4635e058095703/Identity_in_the_Real_World_-_the_Tao_of_Extensibility_JP.png","details":{"size":65953,"image":{"width":600,"height":856}},"fileName":"Identity in the Real World - the Tao of Extensibility_JP.png","contentType":"image/png"}}},"title":"アイデンティティ ソリューションの現実: 拡張を選ぶメリット","id":"jp-tao-of-extensibility","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:52.808Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6rfEEWXOK5uhZrN40M3Ju0","type":"Asset","createdAt":"2022-04-01T19:44:13.589Z","updatedAt":"2022-04-01T19:48:45.617Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"B-to-Bの顧客IDーOrganizations","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6rfEEWXOK5uhZrN40M3Ju0/f95544e3d30e2102a580047b20ab0be8/Organizations_brochure-JP-Resource_Cover_625x892px.jpg","details":{"size":136070,"image":{"width":600,"height":856}},"fileName":"Organizations brochure-JP-Resource Cover_625x892px.jpg","contentType":"image/jpeg"}}},"title":"B-to-Bの顧客IDーOrganizations","id":"organizations-brochure-b2b-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:52.533Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5TUni1HQtj2OOKXxPFd8uQ","type":"Asset","createdAt":"2022-03-31T23:10:37.327Z","updatedAt":"2022-03-31T23:38:36.848Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":3,"locale":"en-US"},"fields":{"title":"自社構築か購入か: B-to-Bアイデンティティ管理ソリューションの評価","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5TUni1HQtj2OOKXxPFd8uQ/a34ba4e0ebc8f671d4af44fecd921e81/BuildvsBuy-JP-Resource_Cover_625x892px.jpg","details":{"size":135222,"image":{"width":600,"height":856}},"fileName":"BuildvsBuy-JP-Resource Cover_625x892px.jpg","contentType":"image/jpeg"}}},"title":"自社構築か購入か:B-to-Bアイデンティティ管理ソリューションの評価","id":"build-vs-buy-b2b-jp","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:52.016Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4Yt8O5qllKw627nUAnlENt","type":"Asset","createdAt":"2022-03-29T17:45:32.109Z","updatedAt":"2022-03-29T23:15:05.930Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"\"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3\"","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4Yt8O5qllKw627nUAnlENt/d3d2f76d6cc6b040405bfa6dd46b4232/-Landing_Page-_3_Attacks_-_JP_pink_625x892px.jpg","details":{"size":103901,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3 Attacks - JP pink 625x892px.jpg","contentType":"image/jpeg"}}},"title":"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3","id":"top-3-attacks-that-threaten-identity-security-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:51.688Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ebIbeVvFlEGHXYRArcJli","type":"Asset","createdAt":"2022-03-24T23:07:49.975Z","updatedAt":"2022-03-24T23:07:49.975Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM - Equilibrio entre seguridad y experiencia del cliente","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6ebIbeVvFlEGHXYRArcJli/dbd44ea2c936deb76bd4ac413822831b/-Landing_Page-_CIAM_Balance_-_ES__625x892px_.jpeg","details":{"size":180453,"image":{"width":600,"height":856}},"fileName":"-Landing Page- CIAM Balance - ES (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"CIAM - Equilibrio entre seguridad y experiencia del cliente","id":"secure-ciam-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:50.657Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2gDTekF7amppqp4as0u4Lo","type":"Asset","createdAt":"2022-03-24T15:36:58.345Z","updatedAt":"2022-03-24T15:36:58.345Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM - セキュリティとカスタマーエクスペリエンスのバランス","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2gDTekF7amppqp4as0u4Lo/05bc6ec376bca580096337a57bd72ed3/-LP-_CIAM_Balance_-_JP_-__625x892px.png","details":{"size":243024,"image":{"width":600,"height":856}},"fileName":"-LP- CIAM Balance - JP - _625x892px.png","contentType":"image/png"}}},"title":"CIAM - セキュリティとカスタマーエクスペリエンスのバランス","id":"secure-ciam-jp","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:50.284Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"54h43Dhm74wtYSpMRLqyGa","type":"Asset","createdAt":"2022-03-24T14:39:00.952Z","updatedAt":"2022-03-24T14:39:00.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM - Conciliez sécurité et expérience client","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/54h43Dhm74wtYSpMRLqyGa/14580146e2feb7f8de6d2ae8f503eb22/-LP-_CIAM_Balance_-_FR_highres__625x892px_.jpeg","details":{"size":180306,"image":{"width":600,"height":856}},"fileName":"-LP- CIAM Balance - FR highres (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"CIAM - Conciliez sécurité et expérience client","id":"secure-ciam-fr","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:49.983Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"45NKx32KNoSbY7WaewmytM","type":"Asset","createdAt":"2022-03-24T14:03:09.232Z","updatedAt":"2022-03-24T14:28:23.134Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"CIAM - Vereinbarung von Sicherheit und Kundenerlebnis","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/45NKx32KNoSbY7WaewmytM/22d22c015b20e8401b65b1bee3ebe806/-LP-_CIAM_Balance_-_DE_highres_625x892px_.jpeg","details":{"size":182389,"image":{"width":600,"height":856}},"fileName":"-LP- CIAM Balance - DE highres(625x892px).jpeg","contentType":"image/jpeg"}}},"title":"CIAM - Vereinbarung von Sicherheit und Kundenerlebnis","id":"secure-ciam-de","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:49.662Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3HHjZv7bUYtYY3RIAEtFsF","type":"Asset","createdAt":"2021-09-07T16:16:27.580Z","updatedAt":"2022-03-21T20:22:19.760Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":2,"locale":"en-US"},"fields":{"title":"State of Secure Identity - JP","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3HHjZv7bUYtYY3RIAEtFsF/eca64f9def87bd683639e1776f52e285/-Landing_Page-_State_of_Secure_Identity_-_JP_-_625x892px.png","details":{"size":205825,"image":{"width":600,"height":856}},"fileName":"-Landing Page- State of Secure Identity - JP - 625x892px.png","contentType":"image/png"}}},"title":"セキュアIDの現状レポート","id":"jp-state-of-security-identity-report","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:49.327Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4BMb9U2YXolciRPA92FApl","type":"Asset","createdAt":"2022-03-18T19:49:59.411Z","updatedAt":"2022-03-18T19:49:59.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 y OpenID Connect: La Guía Profesional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4BMb9U2YXolciRPA92FApl/c2d4b6da33b2cee961ffb89f6045393a/OAuth2_and_OpenID_Connect_625x892px_Spanish.jpg","details":{"size":145477,"image":{"width":600,"height":856}},"fileName":"OAuth2 and OpenID Connect_625x892px_Spanish.jpg","contentType":"image/jpeg"}}},"title":"OAuth2 y OpenID Connect: La Guía Profesional","id":"open-id-connect-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:49.008Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6TJspMvKjGFAuooGDbzADO","type":"Asset","createdAt":"2022-01-20T09:42:28.068Z","updatedAt":"2022-01-21T10:20:37.345Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"IDG Studie CIAM 2022 WP","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6TJspMvKjGFAuooGDbzADO/f43a3eceeaafc53a48a723f5d4593d33/IDG_Studie_CIAM_2022_WP_DE.png","details":{"size":231588,"image":{"width":600,"height":856}},"fileName":"IDG Studie CIAM 2022 WP DE.png","contentType":"image/png"}}},"title":"(C)IAM 2022 - Analyse zu den Erfolgsfaktoren für eine CIAM-Strategie","id":"wp-idg-ciam-study-2022-de","language":"DE"},{"type":"webinars","updatedAt":"2022-09-09T03:08:48.640Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6VoE9JxeajbSOuVpIHWIig","type":"Asset","createdAt":"2022-03-16T19:29:40.837Z","updatedAt":"2022-03-16T19:46:04.375Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Komplexe Identitäten - Der einfache Weg!","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6VoE9JxeajbSOuVpIHWIig/264d6e61a6bc3b0580b908329756430a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":96073,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Komplexe Identitäten - Der einfache Weg!","id":"complex-identity-de","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:48.114Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ycSKktkrDEla6ofpMhkTa","type":"Asset","createdAt":"2022-03-14T19:59:31.336Z","updatedAt":"2022-03-14T19:59:31.336Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographie: Les 3 principales attaques menaçant la sécurité des identités","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ycSKktkrDEla6ofpMhkTa/8683a5271b378b0976f5d95a07249b00/-Landing_Page-_3Attacks_-_FR__625x892px_.jpeg","details":{"size":180172,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - FR (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Infographie: Les 3 principales attaques menaçant la sécurité","id":"state-of-secure-identity-infographic-fr","language":"FR"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:47.417Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3E31FFcXHVB5UWe0vwI8RX","type":"Asset","createdAt":"2022-03-14T18:43:30.536Z","updatedAt":"2022-03-18T18:39:28.562Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Infografik: Die drei häufigsten Angriffsgefahren","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3E31FFcXHVB5UWe0vwI8RX/75401a9d169c8808aa8561cfafdd87e7/-Landing_Page-_3Attacks_-_DE__625x892px_.jpg","details":{"size":193802,"image":{"width":600,"height":856}},"fileName":"-Landing_Page-_3Attacks_-_DE__625x892px_.jpg","contentType":"image/jpeg"}}},"title":"Infografik: Die drei häufigsten Angriffsgefahren","id":"state-of-secure-identity-infographic-de","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:46.985Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1SmvixDSBLmhe4XBqXqiAw","type":"Asset","createdAt":"2022-03-12T01:53:03.206Z","updatedAt":"2022-03-12T01:53:03.206Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Rapport sur l’État de l’identité sécurisée","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1SmvixDSBLmhe4XBqXqiAw/c5e6c600b641d4bec15fc926cf7156c7/-Landing_Page-_State_of_Secure_Identity_-_FR__625x892px_.jpeg","details":{"size":97070,"image":{"width":600,"height":856}},"fileName":"-Landing Page- State of Secure Identity - FR (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Rapport sur l’État de l’identité sécurisée","id":"state-of-security-identity-report-fr","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:46.664Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"65MictRRsZcj8GXe6DzAE6","type":"Asset","createdAt":"2022-03-12T01:31:33.748Z","updatedAt":"2022-03-12T01:31:46.530Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Der Bericht zur Lage der sicheren Identität","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/65MictRRsZcj8GXe6DzAE6/644b8714f4b720a6dad1dea5de15b547/-Landing_Page-_State_of_Secure_Identity_-_DE__625x892px___2_.jpeg","details":{"size":98629,"image":{"width":600,"height":856}},"fileName":"-Landing Page- State of Secure Identity - DE (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"title":"Der Bericht zur Lage der sicheren Identität","id":"state-of-security-identity-report-de","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:46.276Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1mhxq42kDQ7RfvD6YlNOjr","type":"Asset","createdAt":"2021-10-06T20:52:34.018Z","updatedAt":"2022-03-12T01:05:57.776Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"El estado de la identidad segura","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1mhxq42kDQ7RfvD6YlNOjr/7179b28cd13614b9edb652504b6ecf2d/-Landing_Page-_State_of_Secure_Identity_-_ES__625x892px_.jpeg","details":{"size":96009,"image":{"width":600,"height":856}},"fileName":"-Landing Page- State of Secure Identity - ES (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"El estado de la identidad segura","id":"state-of-secure-identity-report-es","language":"ES"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:45.542Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6v44fvM0CF1ifrYCjWo1Kd","type":"Asset","createdAt":"2021-12-02T19:33:31.015Z","updatedAt":"2022-03-12T00:42:25.034Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":3,"locale":"en-US"},"fields":{"title":"Infografía: Los 3 principales ataques ala seguridad de la identidad","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6v44fvM0CF1ifrYCjWo1Kd/515f33a1b2f264b7ac08632ec0940cb0/-Landing_Page-_3Attacks_-_ES__625x892px_.jpeg","details":{"size":184722,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - ES (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Infografía: Los 3 principales ataques a la seguridad de la identidad","id":"state-of-secure-identity-infographic-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:44.832Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7IoYu1HQqP6XejjfuxmsJL","type":"Asset","createdAt":"2022-03-02T23:36:50.945Z","updatedAt":"2022-03-07T19:06:01.357Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":4,"locale":"en-US"},"fields":{"title":"GMQ ESP Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7IoYu1HQqP6XejjfuxmsJL/f5ac16e9801f9a8eb5d32a120bb1f753/GMQ_ESP_Cover__1_.png","details":{"size":223756,"image":{"width":600,"height":856}},"fileName":"GMQ_ESP_Cover (1).png","contentType":"image/png"}}},"title":"Gartner® Magic Quadrant™ para la Gestión de Acceso 2021","id":"gartner-magic-quadrant-gestion-de-acceso","language":"ES"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:44.383Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6H5Lbks8P4KJ3qH1JKuijP","type":"Asset","createdAt":"2022-02-18T09:27:32.863Z","updatedAt":"2022-02-18T09:51:45.113Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Passwortlose Authentifizierung - Thumbnail","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6H5Lbks8P4KJ3qH1JKuijP/7685fd942193c6d6378f722e590ef74e/Passwortlose_Authentifizierung_-_Cover.png","details":{"size":131949,"image":{"width":600,"height":856}},"fileName":"Passwortlose Authentifizierung - Cover.png","contentType":"image/png"}}},"title":"Passwortlose Authentifizierung","id":"passwortlose-authentifizierung","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:44.059Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"16WamAUy5bya4mnM9nQXPq","type":"Asset","createdAt":"2022-02-03T14:52:40.578Z","updatedAt":"2022-02-03T15:46:48.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"CIAM for Dummies DE Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/16WamAUy5bya4mnM9nQXPq/fcebd8310aa11edc65ab0a3b81767622/CIAM_for_Dummies_DE_Cover.png","details":{"size":180019,"image":{"width":600,"height":856}},"fileName":"CIAM for Dummies DE Cover.png","contentType":"image/png"}}},"title":"Customer Identity \u0026 Access Management For Dummies (CIAM)","id":"ciam-for-dummies-de","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:43.725Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"73UkZchKJ7j6x67SFtVTpG","type":"Asset","createdAt":"2022-01-14T11:13:52.744Z","updatedAt":"2022-01-14T11:22:49.895Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"IDG CIAM 2022 - Die wichtigsten Ergebnisse Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/73UkZchKJ7j6x67SFtVTpG/45538bfa8bf5abec07fafe6d5777bc3f/idg-ciam-studie-cover-de.png","details":{"size":225065,"image":{"width":600,"height":856}},"fileName":"idg-ciam-studie-cover-de.png","contentType":"image/png"}}},"title":"Studie (C)IAM 2022 - Die wichtigsten Ergebnisse","id":"studie-ciam-2022-die-wichtigsten-ergebnisse","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:43.283Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5fiptiYSUh6ZwNU9mNKlxG","type":"Asset","createdAt":"2022-02-02T09:27:53.979Z","updatedAt":"2022-02-02T10:43:43.328Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"IDG CIAM 2022 - FR","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5fiptiYSUh6ZwNU9mNKlxG/cf89dee60e6c0fba30c1ae526b33f730/IDG_CIAM_2022_-_FR.png","details":{"size":227797,"image":{"width":600,"height":856}},"fileName":"IDG CIAM 2022 - FR.png","contentType":"image/png"}}},"title":"Étude (C)IAM 2022","id":"idg-ciam-study-2022-fr","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:42.975Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3eqzy0kv9rH9zU3AJIjrXR","type":"Asset","createdAt":"2022-01-20T12:34:52.377Z","updatedAt":"2022-01-20T12:34:52.377Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Sichere digitale Authentifizierung mit Identitatsnachweis Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3eqzy0kv9rH9zU3AJIjrXR/67868bc24987b718f6cd585f22efbc97/Sichere_digitale_Authentifizierung_mit_Identitatsnachweis_Cover.png","details":{"size":374998,"image":{"width":600,"height":856}},"fileName":"Sichere digitale Authentifizierung mit Identitatsnachweis Cover.png","contentType":"image/png"}}},"title":"Sichere digitale Authentifizierung mit Identitätsnachweis","id":"secure-digital-authentication-id-proofing-de","language":"DE"},{"type":"webinars","updatedAt":"2022-09-09T03:08:42.574Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4VuiXT7J80b5XsRg1MDZ1f","type":"Asset","createdAt":"2021-12-10T05:03:44.477Z","updatedAt":"2021-12-10T05:03:44.477Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"[Landing Page] Gated Content - Technical Masterclass 2021","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4VuiXT7J80b5XsRg1MDZ1f/d875ac07ffe4f5494e367adfba34eab9/-Landing_Page-_Gated_Content_-_Technical_Masterclass_2021__625x892px_.png","details":{"size":314513,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content - Technical Masterclass 2021 (625x892px).png","contentType":"image/png"}}},"title":"Technical Masterclass 2021: Hürden und Helfer in der Benutzermigration","id":"technical-masterclass-2021-12-dach","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:42.241Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1p04PcgDoLt2eeAV4rvl3G","type":"Asset","createdAt":"2021-12-08T21:39:46.312Z","updatedAt":"2021-12-08T21:39:46.312Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"期待値 VS. 現実:ログイン において","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1p04PcgDoLt2eeAV4rvl3G/7be840cbe9671ad36243859ec9533532/Screen_Shot_2021-12-08_at_1.33.35_PM.png","details":{"size":550208,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-12-08 at 1.33.35 PM.png","contentType":"image/png"}}},"title":"期待値 VS. 現実:ログイン において","id":"expectations-vs-reality-log-inn-jp","language":"JP"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.923Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3pOpbobbk1VdwOdRsyEkn8","type":"Asset","createdAt":"2021-10-13T15:44:26.425Z","updatedAt":"2021-11-18T08:55:42.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":5,"locale":"en-US"},"fields":{"title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3pOpbobbk1VdwOdRsyEkn8/c1de7ccab1b8af31dda5eed2d424e06d/dach-webinar-2021-11.jpg","details":{"size":55420,"image":{"width":600,"height":856}},"fileName":"dach-webinar-2021-11.jpg","contentType":"image/jpeg"}}},"title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","id":"identity-strategy-dach-rec","language":"DE"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.637Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5oLGLGkR8tFVNIVAr8NlCD","type":"Asset","createdAt":"2021-10-28T23:06:47.093Z","updatedAt":"2021-10-30T00:23:20.254Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"El estado de identidad segura de Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5oLGLGkR8tFVNIVAr8NlCD/995d0e91f74e7dc33071a1d283277da5/updated-state-of-secure-identity-es.jpeg","details":{"size":63344,"image":{"width":600,"height":856}},"fileName":"updated-state-of-secure-identity-es.jpeg","contentType":"image/jpeg"}}},"title":"El estado de identidad segura de Auth0","id":"state-of-secure-identity-webinar-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:41.340Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4TkN07nDkWUC0UmGjJ8mzY","type":"Asset","createdAt":"2020-08-28T20:48:54.910Z","updatedAt":"2021-09-29T21:46:09.996Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":4,"locale":"en-US"},"fields":{"title":"Desenvolver vs. Comprar: Guia de Gestão de Identidades","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4TkN07nDkWUC0UmGjJ8mzY/9d3513bf858d61ec14f1646b99ea962b/72352_Update_whitepaper_cover_page_designs_D2.jpg","details":{"size":62546,"image":{"width":600,"height":856}},"fileName":"72352_Update whitepaper cover page designs_D2.jpg","contentType":"image/jpeg"}}},"title":"Desenvolver vs. Comprar","id":"Desenvolver-vs-Comprar","language":"PT"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.044Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7uGFs6V1NWI3BWfy2Y2tIV","type":"Asset","createdAt":"2021-11-15T19:59:31.294Z","updatedAt":"2021-11-15T19:59:31.294Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"O estado da identidade segura da Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7uGFs6V1NWI3BWfy2Y2tIV/32aaa2df1b6c840141969914f8cc2920/pt-state-of-secure-identity-webinar-thumbnail.jpeg","details":{"size":58083,"image":{"width":600,"height":856}},"fileName":"pt-state-of-secure-identity-webinar-thumbnail.jpeg","contentType":"image/jpeg"}}},"title":"O estado da identidade segura da Auth0","id":"state-of-secure-identity-webinar-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:40.709Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"47bNBMMdzsbM1tzw1vRkYK","type":"Asset","createdAt":"2020-09-14T23:38:43.775Z","updatedAt":"2021-11-04T23:00:45.054Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"El Estado del ensamblado de aplicaciones 2020","file":{"url":"//images.ctfassets.net/2ntc334xpx65/47bNBMMdzsbM1tzw1vRkYK/294df040fed914d77d692b3a234eb29a/0001.jpg","details":{"size":31806,"image":{"width":600,"height":856}},"fileName":"0001.jpg","contentType":"image/jpeg"}}},"title":"El Estado del ensamblado de aplicaciones 2020","id":"El-Estado-del-ensamblado-de-aplicaciones-2020","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:40.422Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1w4gqeoluZVrO3jhfaBf15","type":"Asset","createdAt":"2021-02-11T21:15:00.398Z","updatedAt":"2021-11-19T23:21:42.629Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":3,"locale":"en-US"},"fields":{"title":"Cómo Solucionar una Autenticación Vulnerada","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1w4gqeoluZVrO3jhfaBf15/355d053be50d84c37b44cc5993e1d0f5/Screen_Shot_2021-11-19_at_3.20.53_PM.png","details":{"size":149635,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-11-19 at 3.20.53 PM.png","contentType":"image/png"}}},"title":"Cómo Solucionar una Autenticación Vulnerada","id":"Como-solucionar-una-autenticacion-vulnerada","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:40.094Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4E3l4z4eJJQ1evvnjib4h2","type":"Asset","createdAt":"2021-02-12T18:23:25.425Z","updatedAt":"2021-11-03T23:27:23.387Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":4,"locale":"en-US"},"fields":{"title":"Desarrollar o comprar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4E3l4z4eJJQ1evvnjib4h2/a31f00bbf93578b45a1b636cdfc137ed/Screen_Shot_2021-11-03_at_4.18.20_PM.png","details":{"size":160482,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-11-03 at 4.18.20 PM.png","contentType":"image/png"}}},"title":"Desarrollar o comprar: Guia de administracion de identidad","id":"Construir-o-comprar","language":"ES"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:39.774Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Zatc6bwOnNMdkKflsQzF5","type":"Asset","createdAt":"2021-10-28T16:29:19.377Z","updatedAt":"2021-10-28T16:29:19.377Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAMは何ですか","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3Zatc6bwOnNMdkKflsQzF5/560b8d057976d9144ba4ba74a7f0382a/Okta_CIAM_Auth0_WH200_JP.png","details":{"size":200663,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_JP.png","contentType":"image/png"}}},"title":"誰でもわかる顧客のアイデンティティおよびアクセス管理 (CIAM)","id":"ciam-for-dummies-jp","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:39.460Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5fqRarCWScVr8jM3S2obBH","type":"Asset","createdAt":"2021-10-20T09:20:46.953Z","updatedAt":"2021-10-20T09:20:46.953Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM for Dummies (Spanish)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5fqRarCWScVr8jM3S2obBH/4a974f2ec4b43e79864bbf0e092f43da/Okta_CIAM_Auth0_WH200_ES__1_.png","details":{"size":239116,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_ES (1).png","contentType":"image/png"}}},"title":"Guía de administración de identidades y acceso de clientes (CIAM)","id":"ciam-for-dummies-es","language":"ES"},{"type":"webinars","updatedAt":"2022-09-09T03:08:39.196Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XhKDaCEioEe82q9lPRFkq","type":"Asset","createdAt":"2021-10-19T16:43:11.580Z","updatedAt":"2021-10-19T16:43:11.580Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement als Lupe in Ihre Anwendung","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4XhKDaCEioEe82q9lPRFkq/c009350f0f27a18f73d9cd9c1a1458ea/identity-management-de.jpeg","details":{"size":68599,"image":{"width":600,"height":856}},"fileName":"identity-management-de.jpeg","contentType":"image/jpeg"}}},"title":"Identitätsmanagement als Lupe in Ihre Anwendung","id":"identitasmanagement-oparco-partner-webinar","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:38.889Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4dOuZtyP0bx94YUPuMy6AF","type":"Asset","createdAt":"2021-10-11T23:13:01.997Z","updatedAt":"2021-10-11T23:13:01.997Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Checklist do Guia do comprador de CIAM para Serviços financeiros","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4dOuZtyP0bx94YUPuMy6AF/1cecb46c469b1172b575584cb712b748/_Landing_Page__Gated_Content__any___625x892px___2_.jpeg","details":{"size":169706,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"title":"Checklist do Guia do comprador de CIAM para Serviços financeiros","id":"finserv-buyers-guide-to-ciam-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:38.588Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6NZhpNgvgBz5GKmMraPZbX","type":"Asset","createdAt":"2021-10-11T22:44:44.590Z","updatedAt":"2021-10-11T22:44:44.590Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Servicios financieros Lista de comprobación de la Guía del comprador de CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6NZhpNgvgBz5GKmMraPZbX/c74a6273e2797afb2422486ad447fcc1/Gated_content_CIAM_buyers_guide_Finserv_-_Spanish_cover.jpeg","details":{"size":173743,"image":{"width":600,"height":856}},"fileName":"Gated content CIAM buyers guide Finserv - Spanish cover.jpeg","contentType":"image/jpeg"}}},"title":"Checklist para servicios financieros de la Guía del comprador CIAM","id":"finserv-buyers-guide-to-ciam-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:38.181Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4HLC5sNcbgJXoRqASxfl7f","type":"Asset","createdAt":"2021-10-05T23:42:22.530Z","updatedAt":"2021-10-05T23:42:22.530Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"locale":"en-US"},"fields":{"title":"Checklist da autenticação passwordless","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4HLC5sNcbgJXoRqASxfl7f/579cbef01a20a804988ea1abf6a4cb47/Screen_Shot_2021-10-05_at_4.41.58_PM.png","details":{"size":169070,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-10-05 at 4.41.58 PM.png","contentType":"image/png"}}},"title":"Checklist da autenticação passwordless","id":"passwordless-authentiation-checklist-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:37.880Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2pxUAHXcPnC9dDCHRFRiV9","type":"Asset","createdAt":"2021-10-05T23:27:41.483Z","updatedAt":"2021-10-05T23:27:41.483Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Lista de comprobación de autenticación sin contraseña","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2pxUAHXcPnC9dDCHRFRiV9/166856ee3d548b225663fef671350ad8/Screen_Shot_2021-10-05_at_4.26.25_PM.png","details":{"size":174623,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-10-05 at 4.26.25 PM.png","contentType":"image/png"}}},"title":"Lista de comprobación de autenticación sin contraseña","id":"passwordless-authentiation-checklist-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:37.559Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"h3uCR61TC0L1XJWqELoL1","type":"Asset","createdAt":"2021-10-05T22:25:26.013Z","updatedAt":"2021-10-05T22:25:26.013Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"LGPD - Cómo prepararse para la Ley de Protección de Datos de Brasil","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/h3uCR61TC0L1XJWqELoL1/fcd2070efbc0abd89b5dc516f8d17071/Auth0-Whitepaper-LGPD-ES-preview.jpeg","details":{"size":104359,"image":{"width":600,"height":856}},"fileName":"Auth0-Whitepaper-LGPD-ES-preview.jpeg","contentType":"image/jpeg"}}},"title":"LGPD - Cómo prepararse para la Ley de Protección de Datos de Brasil","id":"lgpd-whitepaper-es","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:36.962Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"wZBGbv7hXcWETn3aZcKRb","type":"Asset","createdAt":"2021-10-05T22:28:49.903Z","updatedAt":"2021-10-05T22:28:49.903Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"LGPD - Preparação para a Lei de Proteção de Dados do Brasil","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/wZBGbv7hXcWETn3aZcKRb/3f2802188bb228e638a68bfef1e9aae5/LGPD_whitepaper_PT.jpeg","details":{"size":104561,"image":{"width":600,"height":856}},"fileName":"LGPD whitepaper PT.jpeg","contentType":"image/jpeg"}}},"title":"LGPD - Preparação para a Lei de Proteção de Dados do Brasil","id":"lgpd-whitepaper-pt","language":"PT"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:36.653Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7zWpcgzbwwd5nhC9ZSfLnH","type":"Asset","createdAt":"2021-09-24T16:04:28.799Z","updatedAt":"2021-09-24T16:04:28.799Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM pour les nuls","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7zWpcgzbwwd5nhC9ZSfLnH/d4da0ea7a63f70caa49d95d74b25e91b/Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Preview.png","details":{"size":182828,"image":{"width":600,"height":856}},"fileName":"Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Preview.png","contentType":"image/png"}}},"title":"CIAM pour les nuls","id":"ciam-pour-les-nuls","language":"FR"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:36.013Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1grL6iMUxyodXxASzTBorz","type":"Asset","createdAt":"2021-09-23T21:02:20.955Z","updatedAt":"2021-09-23T21:02:20.955Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1grL6iMUxyodXxASzTBorz/7874eee1a2592b0b8a908fadefdd281f/Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Preview.png","details":{"size":179644,"image":{"width":600,"height":856}},"fileName":"Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Preview.png","contentType":"image/png"}}},"title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","id":"idaas-fur-dummies-ihr-handbuch-zu-identity-as-a-service","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:35.648Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4jzT35trkTrNMvrxvBRVei","type":"Asset","createdAt":"2021-08-02T15:27:28.281Z","updatedAt":"2021-08-02T15:27:28.281Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Nomura Case Study","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4jzT35trkTrNMvrxvBRVei/2f510be223baeeae15f218facd67f517/NOMURA-cover.png","details":{"size":113518,"image":{"width":600,"height":856}},"fileName":"NOMURA-cover.png","contentType":"image/png"}}},"title":"野村證券がDX戦略の一環として展開する「FINTOS!」の認証・認可機能にAuth0を採用","id":"jp-casestudy-nomura","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:35.321Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1sV1GSz2MaIYYuqBiXBQmx","type":"Asset","createdAt":"2021-04-26T15:43:25.852Z","updatedAt":"2021-06-08T17:09:23.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"locale":"en-US"},"fields":{"title":"Entwickeln vs. Kaufen für Finanzdienstleistungen","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1sV1GSz2MaIYYuqBiXBQmx/80cd971685ab59dfc16e52a44cd2d078/Resource_Page_Cover__625x892px_.jpeg","details":{"size":67362,"image":{"width":600,"height":856}},"fileName":"Resource Page Cover (625x892px).jpeg","contentType":"image/jpeg"}}},"title":"Entwickeln vs. Kaufen für Finanzdienstleistungen","id":"entwickeln-kaufen-finanzdienstleistungen","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:34.982Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"pnMysFoGVT1X5x7otCWKa","type":"Asset","createdAt":"2021-07-12T15:46:39.292Z","updatedAt":"2021-07-12T15:46:39.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Security in the Cloud - DE","file":{"url":"//images.ctfassets.net/2ntc334xpx65/pnMysFoGVT1X5x7otCWKa/0d9be078df76780303160b03e10a4800/LP_Cover_-_AWS_-_DE.jpeg","details":{"size":134818,"image":{"width":600,"height":856}},"fileName":"LP Cover - AWS - DE.jpeg","contentType":"image/jpeg"}}},"title":"Sicherheit in der Cloud: Identitätsmanagement und Risikominderung","id":"security-in-the-cloud-de","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:34.665Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7GnJXoqIS51A8nBDNlxirg","type":"Asset","createdAt":"2021-07-09T23:36:26.106Z","updatedAt":"2021-07-09T23:36:26.106Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"La sécurité dans le cloud: Gestion des identités et des accès","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7GnJXoqIS51A8nBDNlxirg/9d90bcb59c60cebbb43b13d4bef99fb4/LP_Cover_-_AWS-FR.jpeg","details":{"size":137004,"image":{"width":600,"height":856}},"fileName":"LP Cover - AWS-FR.jpeg","contentType":"image/jpeg"}}},"title":"Comment la gestion des identités stimule l'innovation du Cloud","id":"security-in-the-cloud-fr","language":"FR"},{"type":"webinars","updatedAt":"2022-09-09T03:08:34.356Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1mxjhuxeVe47kr5AF9EY5m","type":"Asset","createdAt":"2021-06-02T17:16:25.619Z","updatedAt":"2021-06-16T20:25:25.624Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1mxjhuxeVe47kr5AF9EY5m/4a65fb1ad4a8b8c07ea5e85542c8c5ed/Auth0-Resource_Cover-iC-Consult.png","details":{"size":145663,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-iC-Consult.png","contentType":"image/png"}}},"title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","id":"modernes-ciam","language":"DE"},{"type":"webinars","updatedAt":"2022-09-09T03:08:34.058Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1MhcmV78sDblA49uqdUKWW","type":"Asset","createdAt":"2021-05-19T17:03:58.778Z","updatedAt":"2021-06-16T20:30:48.493Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"La defensa contra ataques automatizados","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1MhcmV78sDblA49uqdUKWW/bd960b66e6b6da158871d1e48e2ba4ff/Webinar__ES__Latam.jpeg","details":{"size":78300,"image":{"width":600,"height":856}},"fileName":"Webinar (ES) Latam.jpeg","contentType":"image/jpeg"}}},"title":"La defensa contra ataques automatizados","id":"la-defensa-contra-ataques-automatizados-on-demand","language":"ES"},{"type":"webinars","updatedAt":"2022-09-09T03:08:33.664Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7jr0wXzKoy5En25iMILhqB","type":"Asset","createdAt":"2021-05-19T16:44:04.316Z","updatedAt":"2021-05-20T13:55:28.827Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":2,"locale":"en-US"},"fields":{"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7jr0wXzKoy5En25iMILhqB/b187c6b8a41cf2d78ce0ef939f038fde/Auth0-Resource_Cover-PwC-GC__1_.png","details":{"size":201896,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-PwC-GC (1).png","contentType":"image/png"}}},"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","id":"identitatsmanagement-webinar-de","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:33.246Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"69fbL9kNRGaJgRgajXsK4W","type":"Asset","createdAt":"2021-05-12T22:19:28.357Z","updatedAt":"2021-05-12T22:19:28.357Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticacao Vulneravel","file":{"url":"//images.ctfassets.net/2ntc334xpx65/69fbL9kNRGaJgRgajXsK4W/5e4e4ca3caccc6b8a7317fd338793e93/Whitepaper_Cover_Letter__6_.jpeg","details":{"size":79794,"image":{"width":600,"height":856}},"fileName":"Whitepaper Cover_Letter (6).jpeg","contentType":"image/jpeg"}}},"title":"Consertando Autenticação Vulnerável","id":"consertando-autenticacao-vulneravel-pt","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:08:25.738Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1WuuyJvCPy8MkLjr7WoNwO","type":"Asset","createdAt":"2021-04-09T18:55:20.047Z","updatedAt":"2022-09-09T03:08:22.684Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":37,"revision":9,"locale":"en-US"},"fields":{"title":"Construir vs comprar: serviços financeiros","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1WuuyJvCPy8MkLjr7WoNwO/9b4d19b5254841e4c81c5676da034467/0001_2.jpg","details":{"size":36209,"image":{"width":600,"height":856}},"fileName":"0001 2.jpg","contentType":"image/jpeg"}}},"title":"Construir vs comprar: serviços financeiros","id":"construir-vs-comprar-finserv-ciam-iam","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:43.389Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6jfThl0CP5y8xajYYpf1UH","type":"Asset","createdAt":"2021-04-22T18:21:37.362Z","updatedAt":"2021-04-22T18:21:37.362Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Guia Usuario CIAM","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6jfThl0CP5y8xajYYpf1UH/2e8cd5287721a68d422d542111713ab2/Whitepaper_Cover_Letter__4_.jpeg","details":{"size":71958,"image":{"width":600,"height":856}},"fileName":"Whitepaper Cover_Letter (4).jpeg","contentType":"image/jpeg"}}},"title":"Guia do Usuário CIAM","id":"guia-usuario-ciam","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:43.014Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5gX57QQx9bBKgCXajOWDXf","type":"Asset","createdAt":"2021-04-05T19:36:26.043Z","updatedAt":"2021-04-08T18:52:08.578Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":5,"locale":"en-US"},"fields":{"title":"cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5gX57QQx9bBKgCXajOWDXf/1dd4186226c809b76232b0fc149364d3/Whitepaper_Cover_Letter__3_.jpeg","details":{"size":67720,"image":{"width":600,"height":856}},"fileName":"Whitepaper Cover_Letter (3).jpeg","contentType":"image/jpeg"}}},"title":"Visão geral da solução Auth0","id":"visao-geral-da-solucao","language":"PT"},{"type":"webinars","updatedAt":"2022-09-09T03:07:42.679Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1bn2LyLsfrQJuTrFh1bU9w","type":"Asset","createdAt":"2021-03-25T14:46:53.548Z","updatedAt":"2021-03-25T14:46:53.548Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0-Securite-dans-le-Cloud-Cover","description":"Auth0-Securite-dans-le-Cloud-Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1bn2LyLsfrQJuTrFh1bU9w/8421c7277372c0a573771a5d80fa0dd5/Auth0-Securite-dans-le-Cloud-Cover.png","details":{"size":409465,"image":{"width":600,"height":856}},"fileName":"Auth0-Securite-dans-le-Cloud-Cover.png","contentType":"image/png"}}},"title":"Est-ce que le Cloud est sur le point de subir une crise d’identité?","id":"Securite-dans-le-Cloud","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:42.269Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ovYVP0BdeZBVkT88Vixyl","type":"Asset","createdAt":"2021-02-11T15:21:46.656Z","updatedAt":"2021-11-19T23:30:01.494Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"Desarrollar o Comprar para Servicios Financieros - Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ovYVP0BdeZBVkT88Vixyl/6ad5b692b1284eea1661b78c3097ec7a/Screen_Shot_2021-11-19_at_3.25.35_PM.png","details":{"size":138856,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-11-19 at 3.25.35 PM.png","contentType":"image/png"}}},"title":"Desarrollar o Comprar para Servicios Financieros","id":"desarrollar-o-comprar-servicios-financieros","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:41.964Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3kWgMyjCZWxZCWZZtnhzfK","type":"Asset","createdAt":"2021-02-11T16:27:08.895Z","updatedAt":"2021-11-20T00:00:57.278Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"Guía del Comprador de CIAM","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3kWgMyjCZWxZCWZZtnhzfK/4d4c75a0afce30e08f737bdc8a5a7238/Screen_Shot_2021-11-19_at_4.00.06_PM.png","details":{"size":160913,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-11-19 at 4.00.06 PM.png","contentType":"image/png"}}},"title":"Guía del Comprador de CIAM","id":"Guia-del-Comprador-de-CIAM","language":"ES"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:41.644Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5s416Iot733vLzXO44g5WV","type":"Asset","createdAt":"2021-01-31T19:53:08.404Z","updatedAt":"2021-01-31T19:54:31.446Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-japan-appi-whitepaper-2021","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5s416Iot733vLzXO44g5WV/254b30d8ff013288c6039c3401de285e/jp-japan-appi-whitepaper-2021.png","details":{"size":112904,"image":{"width":600,"height":856}},"fileName":"jp-japan-appi-whitepaper-2021.png","contentType":"image/png"}}},"title":"個人情報保護法(APPI)改正に備える","id":"jp-japan-appi-whitepaper-2021","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:41.235Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"rKql3FLNiyT2qZXrkAt6c","type":"Asset","createdAt":"2020-06-04T16:05:16.304Z","updatedAt":"2020-06-04T16:05:16.304Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Credential Stuffing Attacks FR Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/rKql3FLNiyT2qZXrkAt6c/fb6886ab92b2bcb5dbce0ab4f47bae6f/Resources_Page__Cover__1_.jpeg","details":{"size":49233,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1).jpeg","contentType":"image/jpeg"}}},"title":"Attaques de credential stuffing","id":"attaques-de-credential-stuffing","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:40.682Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7CJada3PhYscoZG62EoEzV","type":"Asset","createdAt":"2019-06-25T13:42:29.591Z","updatedAt":"2019-11-06T11:20:52.944Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2019-06 german whitepaper cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7CJada3PhYscoZG62EoEzV/98365348f9d5d5d869240a10a04ff85b/2019-06_german_whitepaper_cover.png","details":{"size":225001,"image":{"width":600,"height":856}},"fileName":"2019-06_german_whitepaper_cover.png","contentType":"image/png"}}},"title":"Selbst entwickeln oder kaufen? Leitfaden für das Identitätsmanagement","id":"selbst-entwickeln-oder-kaufen","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:40.095Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6mhE887HbDe2yKwkL5HtWF","type":"Asset","createdAt":"2020-09-28T21:27:24.754Z","updatedAt":"2020-09-28T21:27:24.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Raconteur DE image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6mhE887HbDe2yKwkL5HtWF/21cdfa66649a5923b98b81883b924725/Resources_Page__Cover__4_.jpeg","details":{"size":96001,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (4).jpeg","contentType":"image/jpeg"}}},"title":"Digitale Identitätsverwaltung freischalten","id":"digitale-identitatsverwaltung-freischalten","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:39.808Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3InthtBcf4FVyPz4P2QTRg","type":"Asset","createdAt":"2020-06-04T16:22:46.844Z","updatedAt":"2020-06-04T16:22:46.844Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Credential Stuffing Angriffe Hero Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3InthtBcf4FVyPz4P2QTRg/dcb773417238d27162a3ca431305beb0/Resources_Page__Cover.jpeg","details":{"size":51950,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.jpeg","contentType":"image/jpeg"}}},"title":"Credential-Stuffing-Angriffe: Definition und Gegenmaßnahmen","id":"credential-stuffing-angriffe","language":"DE"},{"type":"ebooks","updatedAt":"2022-09-09T03:07:39.377Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5hercciE5JfXNhqo36zyqk","type":"Asset","createdAt":"2020-04-28T16:13:07.413Z","updatedAt":"2020-04-28T16:14:28.023Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":41,"revision":2,"locale":"en-US"},"fields":{"title":"#nodistractions_eBook_DE","description":"DE Version of #nodistractions eBook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5hercciE5JfXNhqo36zyqk/3b4046e3c52379cf8d3f9df7453e35f4/aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","details":{"size":72479,"image":{"width":600,"height":856}},"fileName":"aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","contentType":"image/jpeg"}}},"title":"#keineAblenkungen: ein eBook","id":"keine-ablenkungen-ein-eBook","language":"DE"},{"type":"whitepapers","updatedAt":"2022-09-09T03:07:34.567Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"pG6JS6qOtWqh7VnlfR8Mu","type":"Asset","createdAt":"2020-09-15T23:28:33.077Z","updatedAt":"2022-09-09T03:07:29.137Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":4,"locale":"en-US"},"fields":{"title":"PT-state-of-app-whitepaper-cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/pG6JS6qOtWqh7VnlfR8Mu/85e2e0b463ad0295db82c7018ff85c80/0001_3.jpg","details":{"size":32361,"image":{"width":600,"height":856}},"fileName":"0001 3.jpg","contentType":"image/jpeg"}}},"title":"Condições de Montagem de Aplicativos em 2020","id":"Condicoes-de-Montagem-de-Aplicativos-em-2020","language":"PT"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:15.010Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7zr5SuirnwrkY2nW9ADeHX","type":"Asset","createdAt":"2020-10-30T02:21:29.849Z","updatedAt":"2020-10-30T02:29:47.481Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Débloquer la gestion des identités numériques - Page","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7zr5SuirnwrkY2nW9ADeHX/fb5d626161ce6a0244bc976222a5101c/Resources_Page__Cover.jpeg","details":{"size":70774,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.jpeg","contentType":"image/jpeg"}}},"title":"Débloquer la gestion des identités numériques","id":"débloque-la-gestion-des-identités-numériques","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:14.670Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"69XudUdPyffvHegs2LtffX","type":"Asset","createdAt":"2020-10-15T16:45:07.026Z","updatedAt":"2020-10-15T16:45:53.852Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"LegalForce-cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/69XudUdPyffvHegs2LtffX/37a22d6621902e20373dd37f6de76412/LegalForce-cover.jpg","details":{"size":118025,"image":{"width":600,"height":856}},"fileName":"LegalForce-cover.jpg","contentType":"image/jpeg"}}},"title":"企業法務を支援するLegalForceがAuth0を採用し、さらなる高安全性とサービス機能拡充を実現","id":"jp-casestudy-legalforce","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:14.368Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7FSNYpGQauD0iop1uOimYX","type":"Asset","createdAt":"2019-09-06T14:08:00.890Z","updatedAt":"2019-11-06T11:20:35.042Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":3,"locale":"en-US"},"fields":{"title":"JPN - Do Identity Right","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7FSNYpGQauD0iop1uOimYX/51a9ab6b1f27e5b222a500c8d3d75111/Cover-art-600x856.png","details":{"size":112763,"image":{"width":600,"height":856}},"fileName":"Cover-art-600x856.png","contentType":"image/png"}}},"title":"Do Identity Right − デジタルビジネス戦略の成功のために","id":"jp-identity-digital-business-strategy","language":"JP"},{"type":"videos","updatedAt":"2022-09-09T03:03:14.099Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"33pWmXL5w6eim1aKA1ltnA","type":"Asset","createdAt":"2020-10-02T17:57:45.134Z","updatedAt":"2020-10-02T17:57:45.134Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"jp-security-webinar-sep-2020","file":{"url":"//images.ctfassets.net/2ntc334xpx65/33pWmXL5w6eim1aKA1ltnA/2a160025c30abae6a473e1d6d96cff1b/jp-security-webinar-sep-2020.png","details":{"size":155427,"image":{"width":600,"height":856}},"fileName":"jp-security-webinar-sep-2020.png","contentType":"image/png"}}},"title":"不正ログインから会員情報を守る!~サービス管理者向け、リスト型攻撃への対処法~","id":"jp-security-webinar-sep-2020","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:13.798Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ERE84D7c88YOXc37PtDAW","type":"Asset","createdAt":"2020-02-21T20:14:42.503Z","updatedAt":"2020-02-21T20:14:42.503Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"20200221 Créer-ou-acheter- guide-pour-la-gestion-des-identités Fernanda-Cozzi IAM","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ERE84D7c88YOXc37PtDAW/aa7f3aac9e62d74743336db591d1ec79/20200221_Cre__er-ou-acheter-_guide-pour-la-gestion-des-identite__s_Fernanda-Cozzi_IAM.png","details":{"size":219951,"image":{"width":600,"height":856}},"fileName":"20200221_Créer-ou-acheter-_guide-pour-la-gestion-des-identités_Fernanda-Cozzi_IAM.png","contentType":"image/png"}}},"title":"Créer ou acheter : guide pour la gestion des identités","id":"creer-ou-acheter-gestion-des-identites","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:13.504Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"18ib2mILSsQS6UtXZfbcRl","type":"Asset","createdAt":"2020-03-17T02:59:37.099Z","updatedAt":"2020-03-18T15:41:17.010Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"JP - Build vs Buy- Guide to Evaluating Identity Management Solutions","file":{"url":"//images.ctfassets.net/2ntc334xpx65/18ib2mILSsQS6UtXZfbcRl/4f31d37f4932f5dd9c3a427e07aefdc8/JP_-_Build_vs_Buy-_Guide_to_Evaluating_Identity_Management_Solutions.png","details":{"size":265688,"image":{"width":600,"height":856}},"fileName":"JP - Build vs Buy- Guide to Evaluating Identity Management Solutions.png","contentType":"image/png"}}},"title":"自社構築か、購入か? アイデンティティ管理ガイド","id":"jp-build-vs-buy-evaluating-identity-management","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:12.836Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"24stzlxfvboPSUITgJ7N9O","type":"Asset","createdAt":"2020-03-23T06:33:09.081Z","updatedAt":"2020-03-27T15:43:04.043Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"JP-Why-AWS-Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/24stzlxfvboPSUITgJ7N9O/53baf57d17847524b294f48e86f42326/JP-Why-AWS-Auth0.png","details":{"size":265088,"image":{"width":600,"height":856}},"fileName":"JP-Why-AWS-Auth0.png","contentType":"image/png"}}},"title":"AWS と Auth0 の 強力な連携のメリット","id":"jp-aws-auth0-ebook","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:12.493Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4w5IFxAmZpnzSUsShcvktm","type":"Asset","createdAt":"2020-05-21T15:18:42.049Z","updatedAt":"2020-05-21T15:23:59.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Twitter Banner french-03","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4w5IFxAmZpnzSUsShcvktm/6ebcf33a7cbc32f4038d3d8976afa4c5/Twitter_Banner_french-03.jpg","details":{"size":73758,"image":{"width":600,"height":856}},"fileName":"Twitter Banner_french-03.jpg","contentType":"image/jpeg"}}},"title":"#pasdedistractions: un eBook","id":"pas-de-distractions-un-ebook","language":"FR"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:12.143Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5rfOxFhKF05lWtRQk4Guai","type":"Asset","createdAt":"2020-05-28T15:28:41.395Z","updatedAt":"2020-05-28T15:34:01.036Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":2,"locale":"en-US"},"fields":{"title":"Mistakes to Love FR Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5rfOxFhKF05lWtRQk4Guai/edc59c851d64fe87a2661a6ee68f7b04/Cover.jpg","details":{"size":83279,"image":{"width":600,"height":856}},"fileName":"Cover.jpg","contentType":"image/jpeg"}}},"title":"Apprendre de ses erreurs: une enquête","id":"apprendre-de-ses-erreurs","language":"FR"},{"type":"webinars","updatedAt":"2022-09-09T03:03:11.493Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3drMsHnrgkERsVtERBSIZn","type":"Asset","createdAt":"2020-03-18T05:41:58.500Z","updatedAt":"2020-03-18T05:41:58.500Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"CoverImage-webimar-OIDC","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3drMsHnrgkERsVtERBSIZn/b0960420fbf501a149a8b22aafa75225/CoverImage-webimar-OIDC.png","details":{"size":315091,"image":{"width":600,"height":856}},"fileName":"CoverImage-webimar-OIDC.png","contentType":"image/png"}}},"title":"OpenID Connect とは何か?","id":"jp-the-openid-connect-webinar","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.690Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2kvJZK6pulwPmJoQZG3EeD","type":"Asset","createdAt":"2020-03-09T02:06:56.252Z","updatedAt":"2020-03-10T21:41:25.399Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-authentication-survival-guide-coverimage","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2kvJZK6pulwPmJoQZG3EeD/3037108405588053c1e4b7b912003f3e/jp-authentication-survival-guide-coverimage.png","details":{"size":88970,"image":{"width":600,"height":856}},"fileName":"jp-authentication-survival-guide-coverimage.png","contentType":"image/png"}}},"title":"認証サバイバルガイド","id":"jp-authentication-survival-guide","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.356Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6tROG8J1DwAz2jU5Wmabp8","type":"Asset","createdAt":"2020-02-27T05:40:35.102Z","updatedAt":"2020-03-04T17:21:58.371Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-the-openid-connect-handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6tROG8J1DwAz2jU5Wmabp8/58fede9ad28d23bc49d45c0825550d0f/jp-the-openid-connect-handbook.png","details":{"size":97377,"image":{"width":600,"height":856}},"fileName":"jp-the-openid-connect-handbook.png","contentType":"image/png"}}},"title":"THE OPENID CONNECT ハンドブック","id":"jp-the-openid-connect-handbook","language":"JP"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.038Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1eMvDoQtqlH53j9Mt5U933","type":"Asset","createdAt":"2020-03-27T03:22:09.921Z","updatedAt":"2020-03-31T21:48:06.983Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"jwt-handbook-jp","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1eMvDoQtqlH53j9Mt5U933/6d23f233fcce99a9a1fb6df425944e39/jwt-handbook-jp_Page_01.png","details":{"size":25924,"image":{"width":600,"height":856}},"fileName":"jwt-handbook-jp_Page_01.png","contentType":"image/png"}}},"title":"JWT ハンドブック","id":"jp-jwt-handbook","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T03:03:09.561Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"RlDTA9ZTDq3B5stwTvj3M","type":"Asset","createdAt":"2020-02-26T05:56:29.165Z","updatedAt":"2020-02-28T01:02:57.898Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":2,"locale":"en-US"},"fields":{"title":"Mistakes-whitepaper-jp","file":{"url":"//images.ctfassets.net/2ntc334xpx65/RlDTA9ZTDq3B5stwTvj3M/4c1f9dd3dc6b096b5ebb28314f3af196/Mistakes_WP_v3_JA.jpg","details":{"size":43957,"image":{"width":600,"height":856}},"fileName":"Mistakes_WP_v3_JA.jpg","contentType":"image/jpeg"}}},"title":"アイデンティティ プロジェクト調査: 過去の失敗から学べる多くのこと","id":"jp-mistakes-survey-auth0","language":"JP"},{"type":"whitepapers","updatedAt":"2022-09-09T02:51:07.806Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"W2hUJxbHGZ0LmgkJWmYNg","type":"Asset","createdAt":"2019-08-27T19:08:42.335Z","updatedAt":"2019-11-06T11:20:37.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":5,"locale":"en-US"},"fields":{"title":"DE KuppingerCole whitepaper","file":{"url":"//images.ctfassets.net/2ntc334xpx65/W2hUJxbHGZ0LmgkJWmYNg/31af9bc8072de765802e01625442c6fb/KuppingerCole.png","details":{"size":260710,"image":{"width":600,"height":856}},"fileName":"KuppingerCole.png","contentType":"image/png"}}},"title":"Identitäten richtig handhabena","id":"identitaeten-digitale-geschaeftsstratgie","language":"DE"},{"type":"videos","updatedAt":"2022-03-17T10:36:14.904Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6TJspMvKjGFAuooGDbzADO","type":"Asset","createdAt":"2022-01-20T09:42:28.068Z","updatedAt":"2022-01-21T10:20:37.345Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"IDG Studie CIAM 2022 WP","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6TJspMvKjGFAuooGDbzADO/f43a3eceeaafc53a48a723f5d4593d33/IDG_Studie_CIAM_2022_WP_DE.png","details":{"size":231588,"image":{"width":600,"height":856}},"fileName":"IDG Studie CIAM 2022 WP DE.png","contentType":"image/png"}}},"title":"(C)IAM 2022 - Analyse zu den Erfolgsfaktoren für eine CIAM-Strategie","id":"idg-ciam-study-2022-de","language":"DE"},{"type":"webinars","updatedAt":"2021-06-03T22:48:46.563Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ojY9VA3N1gmSPja0Y9v6S","type":"Asset","createdAt":"2021-06-03T21:45:08.958Z","updatedAt":"2021-06-03T21:45:08.958Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ojY9VA3N1gmSPja0Y9v6S/ace3e8d67b93595d27008349d2c5078b/Auth0-Resource_Cover-Tekaris-GC.png","details":{"size":260059,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Tekaris-GC.png","contentType":"image/png"}}},"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","id":"tekaris-partner-webinar","language":"DE"},{"type":"webinars","updatedAt":"2020-09-29T18:24:20.166Z","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3pJHvEv86aqn8esqhqALQp","type":"Asset","createdAt":"2020-09-23T00:23:53.983Z","updatedAt":"2020-09-23T00:23:53.983Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Komfort und Sicherheit im Identity Management Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3pJHvEv86aqn8esqhqALQp/3a53abc1634c666bb4e47d839d7fbf00/Resources_Page__Cover.jpeg","details":{"size":67679,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.jpeg","contentType":"image/jpeg"}}},"title":"Auth0 + Computerwoche: Komfort und Sicherheit im Identity Management","id":"komfort-und-sicherheit-im-identity-management","language":"DE"}],"metadata":{"noindex":false,"title":"Identity Resources - Webinars, eBooks - Auth0","description":"Learn how we secure and solve the most complex identity use cases with an extensible, easy to integrate platform that powers trillions of logins every year.","image":{"url":"https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png","mimeType":"image/png"}}},"__N_SSG":true},"page":"/resources","query":{},"buildId":"-HHzxANzsf5uxPS9QLsdm","assetPrefix":"/b2b-enterprise-identity-management","isFallback":false,"gsp":true,"customServer":true,"scriptLoader":[]}</script></body></html>