CINXE.COM

eBooks - Infographics, Handbooks, and Playbooks | Auth0

<!DOCTYPE html><html lang="en"><head><title>eBooks - Infographics, Handbooks, and Playbooks | Auth0</title><meta name="viewport" content="initial-scale=1.0, width=device-width"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=5"/><meta name="fragment" content="!"/><meta name="google-site-verification" content="KFViLMGmUy6wD69eTa8DPQhdfDlh_98L7seja7jIUQA"/><meta name="yandex-verification" content="5bf6f6598e8639ca"/><meta name="facebook-domain-verification" content="u12hlura60iag5ysnvf6761lhe6chz"/><meta name="description" content="Explore all Auth0 eBooks. Review detailed infographics and benefit from expert knowledge built into our handbooks and playbooks around identity."/><meta property="og:type" content="website"/><meta property="og:title" content="eBooks - Infographics, Handbooks, and Playbooks | Auth0"/><meta property="og:site_name" content="Auth0"/><meta property="og:description" content="Explore all Auth0 eBooks. Review detailed infographics and benefit from expert knowledge built into our handbooks and playbooks around identity."/><meta property="og:locale" content="en"/><meta property="og:url" content="https://auth0.com/resources/ebooks"/><meta property="og:image" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="og:image:secure_url" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="fb:app_id" content="507756515938786"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@auth0"/><meta name="twitter:creator" content="@auth0"/><meta name="twitter:title" content="eBooks - Infographics, Handbooks, and Playbooks | Auth0"/><meta name="twitter:description" content="Explore all Auth0 eBooks. Review detailed infographics and benefit from expert knowledge built into our handbooks and playbooks around identity."/><meta name="twitter:image:src" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta name="twitter:image:width" content="1024"/><meta name="twitter:image:height" content="512"/><meta name="theme-color" content="#ffffff"/><meta name="pocket-site-verification" content="d301f9bf5a8414226ceee36fc991e9"/><link rel="canonical" href="https://auth0.com/resources/ebooks"/><link rel="alternate" hrefLang="en" href="https://auth0.com/resources/ebooks"/><link rel="alternate" hrefLang="de" href="https://auth0.com/de/resources/ebooks"/><link rel="alternate" hrefLang="fr" href="https://auth0.com/fr/resources/ebooks"/><link rel="alternate" hrefLang="ja" href="https://auth0.com/jp/resources/ebooks"/><link rel="alternate" hrefLang="es" href="https://auth0.com/es/resources/ebooks"/><link rel="alternate" hrefLang="pt" href="https://auth0.com/pt/resources/ebooks"/><link rel="alternate" hrefLang="x-default" href="https://auth0.com/resources/ebooks"/><script type="application/ld+json">{ "@context": "http://schema.org", "@type": "WebPage", "name": "eBooks - Infographics, Handbooks, and Playbooks | Auth0", "description": "Explore all Auth0 eBooks. Review detailed infographics and benefit from expert knowledge built into our handbooks and playbooks around identity.", "url": "https://auth0.com/resources/ebooks", "image": "https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png", "publisher": { "@type": "Organization", "name": "Auth0", "legalName": "Auth0 Inc.", "url": "https://auth0.com/", "logo": "https://cdn.auth0.com/website/home-page/evolution_logo_Auth0_black.svg", "foundingDate": "2013-02-01T00:00:00.000Z", "address": { "@type": "PostalAddress", "streetAddress": "10800 NE 8th Street, Suite 600", "addressLocality": "Bellevue", "addressRegion": "WA", "postalCode": "98004", "addressCountry": "USA" }, "contactPoint": { "@type": "ContactPoint", "contactType": "Customer Support", "telephone": "[+888-235-2699]", "email": "info@auth0.com" }, "sameAs": [ "https://twitter.com/auth0", "https://www.facebook.com/getauth0/", "https://www.linkedin.com/company/auth0" ] } }</script><link rel="preload" href="https://auth0.com/contact-us/api/form-data" as="fetch" crossorigin="use-credentials"/><script> const generateNewContext = () => { return { window: { location: { hash: window.location.hash, host: window.location.host, hostname: window.location.hostname, href: window.location.href, origin: window.location.origin, pathname: window.location.pathname, port: window.location.port, protocol: window.location.protocol, search: window.location.search, }, navigator: { language: window.navigator.language, browserLanguage: window.navigator.browserLanguage, userAgent: window.navigator.userAgent, }, innerHeight: window.innerHeight, innerWidth: window.innerWidth, }, document: { title: document.title, referrer: document.referrer, }, }; }; window.addEventListener('resize', () => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftUpdateContext', data: generateNewContext() }, '*', ); }); window.addEventListener('scroll', (event) => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftParentScroll', data: { scroll: true }, target: 'drift.parentScroll', }, '*', ); }); window.addEventListener('message', function (event) { const iframe = document.getElementById('drift-iframe'); if ( !(iframe && iframe.contentWindow) && event.source === iframe.contentWindow ) { return; } const message = event.data; if (message.type === 'drift:ready') { iframe.contentWindow.postMessage( { type: 'driftSetContext', data: generateNewContext() }, '*', ); } if (message.type === 'drift:resize') { const styles = message.data.styles; for (let key in styles) { if (!styles.hasOwnProperty(key)) { continue; } iframe.style.setProperty(key, styles[key]); } } }); </script><meta name="next-head-count" content="39"/><link rel="shortcut icon mask-icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="16x16" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-16.png"/><link rel="icon" sizes="32x32" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-32.png"/><link rel="icon" sizes="48x48" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="96x96" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-96.png"/><link rel="icon" sizes="144x144" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-144.png"/><link rel="apple-touch-icon" sizes="180x180" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-180.png"/><link rel="stylesheet" type="text/css" href="https://cdn.auth0.com/website/styleguide/core-custom/1.0.3/core.min.css"/><link rel="stylesheet" type="text/css" charSet="UTF-8" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick.min.css"/><link rel="stylesheet" type="text/css" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick-theme.min.css"/><script type="text/plain" class="optanon-category-4">(function (h, o, t, j, a, r) {h.hj = h.hj || function () { (h.hj.q = h.hj.q || []).push(arguments) }; h._hjSettings = { hjid: 301495, hjsv: 5 }; a = o.getElementsByTagName('head')[0]; r = o.createElement('script'); r.async = 1; r.src = t + h._hjSettings.hjid + j + h._hjSettings.hjsv; a.appendChild(r);}(window, document, '//static.hotjar.com/c/hotjar-', '.js?sv='))</script><script type="text/plain" class="optanon-category-4"> window._6si = window._6si || []; window._6si.push(['enableEventTracking', true]); window._6si.push(['setToken', '5400c5b6d4c7c0376f36ed7c5ebbc828']); window._6si.push(['setEndpoint', 'b.6sc.co']); (function() { var gd = document.createElement('script'); gd.type = 'text/javascript'; gd.async = true; gd.src = '//j.6sc.co/6si.min.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(gd, s); })();</script><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW"></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/webpack-cfa3839ec7fdabdd.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/framework-6a6591a01b80b369.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/main-e68cb6968a1dd8fd.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/pages/_app-6a17cdba5a41af92.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/9236dd9e-3270dd4393ecb519.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/fec483df-ae405e1e0dd70591.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/89927-12e85e047d3ef0b6.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/30427-04b7287055e92b55.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/41664-1048fb8eb6ddb2be.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/17379-66d340100ae611a8.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/84599-070f1bb5016ac642.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/725-6c7b3e3159325f7a.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/79217-e092817ce7c764ab.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/14195-ed9161c8715ab134.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/63080-74157126389652dc.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/chunks/pages/resources/%5BresourcesType%5D-3efa750baccb5173.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/_yI9ZUyEK_BOJO9ovBQ41/_buildManifest.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><script src="/b2b-enterprise-identity-management/vercel/_next/static/_yI9ZUyEK_BOJO9ovBQ41/_ssgManifest.js?dpl=dpl_G7C4yazdHvw97Se7oompCDE4Z8PW" defer=""></script><style data-styled="" data-styled-version="5.3.11">html{line-height:1.15;-webkit-text-size-adjust:100%;}/*!sc*/ body{margin:0;}/*!sc*/ main{display:block;}/*!sc*/ h1{font-size:2em;margin:0.67em 0;}/*!sc*/ hr{box-sizing:content-box;height:0;overflow:visible;}/*!sc*/ pre{font-family:monospace,monospace;font-size:1em;}/*!sc*/ a{background-color:transparent;}/*!sc*/ abbr[title]{border-bottom:none;-webkit-text-decoration:underline;text-decoration:underline;-webkit-text-decoration:underline dotted;text-decoration:underline dotted;}/*!sc*/ b,strong{font-weight:bolder;}/*!sc*/ code,kbd,samp{font-family:monospace,monospace;font-size:1em;}/*!sc*/ small{font-size:80%;}/*!sc*/ sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline;}/*!sc*/ sub{bottom:-0.25em;}/*!sc*/ sup{top:-0.5em;}/*!sc*/ img{border-style:none;}/*!sc*/ button,input,optgroup,select,textarea{font-family:inherit;font-size:100%;line-height:1.15;margin:0;}/*!sc*/ button,input{overflow:visible;}/*!sc*/ button,select{text-transform:none;}/*!sc*/ button,[type="button"],[type="reset"],[type="submit"]{-webkit-appearance:button;}/*!sc*/ button::-moz-focus-inner,[type="button"]::-moz-focus-inner,[type="reset"]::-moz-focus-inner,[type="submit"]::-moz-focus-inner{border-style:none;padding:0;}/*!sc*/ button:-moz-focusring,[type="button"]:-moz-focusring,[type="reset"]:-moz-focusring,[type="submit"]:-moz-focusring{outline:1px dotted ButtonText;}/*!sc*/ fieldset{padding:0.35em 0.75em 0.625em;}/*!sc*/ legend{box-sizing:border-box;color:inherit;display:table;max-width:100%;padding:0;white-space:normal;}/*!sc*/ progress{vertical-align:baseline;}/*!sc*/ textarea{overflow:auto;}/*!sc*/ [type="checkbox"],[type="radio"]{box-sizing:border-box;padding:0;}/*!sc*/ [type="number"]::-webkit-inner-spin-button,[type="number"]::-webkit-outer-spin-button{height:auto;}/*!sc*/ [type="search"]{-webkit-appearance:textfield;outline-offset:-2px;}/*!sc*/ [type="search"]::-webkit-search-decoration{-webkit-appearance:none;}/*!sc*/ ::-webkit-file-upload-button{-webkit-appearance:button;font:inherit;}/*!sc*/ details{display:block;}/*!sc*/ summary{display:list-item;}/*!sc*/ template{display:none;}/*!sc*/ [hidden]{display:none;}/*!sc*/ data-styled.g1[id="sc-global-ecVvVt1"]{content:"sc-global-ecVvVt1,"}/*!sc*/ .ZxXlY{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:linear-gradient(81deg,#191919 0%,#383838 100%);border-color:transparent;border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.ZxXlY{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .ZxXlY:active{color:#FFFFFF80;}/*!sc*/ .ZxXlY:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);color:#FFFEFA;background:linear-gradient(79deg,#3F59E4 0%,#4016A0 148.29%);cursor:pointer;}/*!sc*/ .cygfAN{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:transparent;border-color:#191919;border-radius:0.6rem;border-style:solid;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.cygfAN{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .cygfAN:active{color:#FFFFFF80;border-color:#3F59E4;}/*!sc*/ .cygfAN:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);border-color:#3F59E4;color:#3F59E4;background:transparent;cursor:pointer;}/*!sc*/ .lpvcZN{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-width:0;border-color:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.lpvcZN{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .lpvcZN:active{color:rgba(255,254,250,0.8);border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);background:linear-gradient(0deg,rgba(0,0,0,0.20) 0%,rgba(0,0,0,0.20) 100%),radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .lpvcZN:hover{-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);color:#FFFEFA;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);cursor:pointer;-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .lpvcZN:hover{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .lpvcZN:active{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .lpvcZN span{z-index:3;}/*!sc*/ .lpvcZN:hover{background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);}/*!sc*/ .lpvcZN::before{content:'';width:100%;height:100%;display:inline-block;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);opacity:0;position:absolute;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ .lpvcZN:hover::before{opacity:1;}/*!sc*/ data-styled.g2[id="styled__Button-sc-1hwml9q-0"]{content:"ZxXlY,cygfAN,lpvcZN,"}/*!sc*/ .hgOYPl.hgOYPl.hgOYPl{color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .jgibCU.jgibCU.jgibCU{width:100%;}/*!sc*/ .cydknG.cydknG.cydknG{margin-top:1.6rem;width:100%;}/*!sc*/ .cFnjuQ.cFnjuQ.cFnjuQ{color:#191919;font-weight:500;line-height:1.8rem;margin-bottom:2.1rem;}/*!sc*/ .gdLUMv.gdLUMv.gdLUMv{-webkit-text-decoration:none;text-decoration:none;line-height:2.2rem;}/*!sc*/ .jRUMqL.jRUMqL.jRUMqL{color:#191919;margin:0;}/*!sc*/ .bZBVNy.bZBVNy.bZBVNy{font-family:Aeonik,sans-serif;color:#1E212A;margin:0.4rem 0 0;font-weight:500;font-size:1.6rem;line-height:2rem;}/*!sc*/ .cZWjgL.cZWjgL.cZWjgL{display:block;color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .jKVeGi.jKVeGi.jKVeGi{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .dcXmxo.dcXmxo.dcXmxo{font-family:Aeonik,sans-serif;color:#686868;font-size:1.4rem;-webkit-letter-spacing:0.015rem;-moz-letter-spacing:0.015rem;-ms-letter-spacing:0.015rem;letter-spacing:0.015rem;line-height:2rem;}/*!sc*/ .fZlkRU.fZlkRU.fZlkRU{color:#191919;}/*!sc*/ .ctSvSw.ctSvSw.ctSvSw{-webkit-text-decoration:none;text-decoration:none;display:block;}/*!sc*/ .jWvUNs.jWvUNs.jWvUNs{margin-right:1.6rem;-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.4rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.jWvUNs.jWvUNs.jWvUNs{padding:0.65rem 2.4rem;}}/*!sc*/ .cEqvqp.cEqvqp.cEqvqp{-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.2rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.cEqvqp.cEqvqp.cEqvqp{padding:0.65rem 2.2rem;}}/*!sc*/ .dpUTiS.dpUTiS.dpUTiS{color:#141414;font-weight:600;line-height:5.4rem;-webkit-letter-spacing:-0.16rem;-moz-letter-spacing:-0.16rem;-ms-letter-spacing:-0.16rem;letter-spacing:-0.16rem;text-align:left;}/*!sc*/ @media screen and (min-width:900px){.dpUTiS.dpUTiS.dpUTiS{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:1200px){.dpUTiS.dpUTiS.dpUTiS{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:900px){.dpUTiS.dpUTiS.dpUTiS{font-size:6rem;}}/*!sc*/ @media screen and (min-width:1200px){.dpUTiS.dpUTiS.dpUTiS{font-size:6rem;}}/*!sc*/ .kfRWXJ.kfRWXJ.kfRWXJ{font-weight:500;}/*!sc*/ .KYCXS.KYCXS.KYCXS{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .jxtigD.jxtigD.jxtigD{color:#80868F;margin:0;}/*!sc*/ .cCNUxe.cCNUxe.cCNUxe{border-top:0.1rem solid #bdc4cf;padding:2.4rem 1.6rem;color:#80868F;margin:0;}/*!sc*/ data-styled.g3[id="utils-sc-11hlfw-0"]{content:"hgOYPl,jgibCU,cydknG,cFnjuQ,gdLUMv,jRUMqL,bZBVNy,cZWjgL,jKVeGi,dcXmxo,fZlkRU,ctSvSw,jWvUNs,cEqvqp,dpUTiS,kfRWXJ,KYCXS,kHaByn,jxtigD,cCNUxe,"}/*!sc*/ .cruTcJ{margin:0 0 1.6rem 0;color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.cruTcJ{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.cruTcJ{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ .gahICZ{margin:0 0 1.6rem 0;color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.2rem;-webkit-letter-spacing:0.12rem;-moz-letter-spacing:0.12rem;-ms-letter-spacing:0.12rem;letter-spacing:0.12rem;line-height:1.8rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.gahICZ{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.gahICZ{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ data-styled.g7[id="styled__Overline-sc-165cfko-0"]{content:"cruTcJ,gahICZ,"}/*!sc*/ .bRQyBu{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.bRQyBu{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.bRQyBu{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ .cOQfMy{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.cOQfMy{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.cOQfMy{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ .mSpid{margin:0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.mSpid{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.mSpid{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ data-styled.g8[id="styled__Paragraph-sc-165cfko-1"]{content:"bRQyBu,cOQfMy,mSpid,"}/*!sc*/ .eLwCGt{margin:0;color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;padding:0;}/*!sc*/ @media screen and (min-width:900px){.eLwCGt{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;}}/*!sc*/ @media screen and (min-width:1200px){.eLwCGt{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:4rem;-webkit-letter-spacing:-0.08rem;-moz-letter-spacing:-0.08rem;-ms-letter-spacing:-0.08rem;letter-spacing:-0.08rem;line-height:4.4rem;color:#1E212A;}}/*!sc*/ data-styled.g9[id="styled__Heading-sc-165cfko-2"]{content:"eLwCGt,"}/*!sc*/ .ePdqGw{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.ePdqGw{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.ePdqGw{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .ePdqGw:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .ePdqGw:active{color:#493FA3;}/*!sc*/ .ePdqGw:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .ePdqGw:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .fyVFIq{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.fyVFIq{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.fyVFIq{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ .fyVFIq:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .fyVFIq:active{color:#493FA3;}/*!sc*/ .fyVFIq:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cjrfSg{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.cjrfSg{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.cjrfSg{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .cjrfSg:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .cjrfSg:active{color:#493FA3;}/*!sc*/ .cjrfSg:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cjrfSg:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .dlwkNS{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.dlwkNS{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.dlwkNS{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .dlwkNS:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .dlwkNS:active{color:#493FA3;}/*!sc*/ .dlwkNS:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .iRpAA-d{margin:0;padding:0;font-family:Inter,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.iRpAA-d{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.iRpAA-d{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .iRpAA-d:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .iRpAA-d:active{color:#493FA3;}/*!sc*/ .iRpAA-d:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ data-styled.g11[id="styled__Link-sc-bubr9x-0"]{content:"ePdqGw,fyVFIq,cjrfSg,dlwkNS,iRpAA-d,"}/*!sc*/ :root{--content-width:120rem;--font-main:'fakt-web',sans-serif;}/*!sc*/ body{box-sizing:border-box;font-family:var(--font-main);}/*!sc*/ html{font-size:10px;}/*!sc*/ data-styled.g176[id="sc-global-UYKKO1"]{content:"sc-global-UYKKO1,"}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:400;font-display:swap;src:local('Inter-Regular'),url('https://cdn.auth0.com/website/fonts/Inter-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:500;font-display:swap;src:local('Inter-Medium'),url('https://cdn.auth0.com/website/fonts/Inter-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:700;font-display:swap;src:local('Inter-Bold'),url('https://cdn.auth0.com/website/fonts/Inter-Bold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:500;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-Medium'),url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:600;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-SemiBold'),url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-SemiBold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'RobotoMono';font-style:normal;font-weight:400;font-display:swap;src:local('RobotoMono-Regular'),url('https://cdn.auth0.com/quantum-fonts/lib/0.0.9/roboto-mono/files/roboto-mono-latin-400-normal.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:400;font-display:swap;src:local('Aeonik-Regular'),url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'),url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'),url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:400;font-display:swap;src:local('AeonikMono-Regular'),url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:500;font-display:swap;src:local('AeonikMono-Medium'),url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Medium.ttf') format('woff2');}/*!sc*/ data-styled.g177[id="sc-global-gFuWBX1"]{content:"sc-global-gFuWBX1,"}/*!sc*/ html{font-size:62.5%;}/*!sc*/ html h1,html h2,html h3,html h4,html h5,html h6{font-feature-settings:'zero';}/*!sc*/ a:focus{outline:-webkit-focus-ring-color auto 0.2rem;outline-offset:0.1rem;}/*!sc*/ data-styled.g178[id="sc-global-khyXKm1"]{content:"sc-global-khyXKm1,"}/*!sc*/ .jdEhsO{background:#FFFEFA;display:none;position:fixed;z-index:100;top:10.4rem;bottom:0;left:0;right:0;width:100%;overflow:auto;}/*!sc*/ data-styled.g179[id="sc-48604b4d-0"]{content:"jdEhsO,"}/*!sc*/ .gWYFnN{margin-bottom:15rem;padding-left:0;}/*!sc*/ data-styled.g180[id="sc-48604b4d-1"]{content:"gWYFnN,"}/*!sc*/ .cQmDCV{list-style:none;width:100%;border-bottom:0.1rem solid #C5C5C5;}/*!sc*/ .cQmDCV:first-of-type{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g181[id="sc-48604b4d-2"]{content:"cQmDCV,"}/*!sc*/ .bCysoQ{padding:2.4rem 2rem 2.4rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}/*!sc*/ @media screen and (min-width:900px){.bCysoQ{padding-left:6.4rem;padding-right:6.4rem;}}/*!sc*/ data-styled.g182[id="sc-48604b4d-3"]{content:"bCysoQ,"}/*!sc*/ .gYmNyz{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;display:inline-block;width:100%;}/*!sc*/ .gYmNyz:hover{color:#3F59E4;}/*!sc*/ data-styled.g183[id="sc-48604b4d-4"]{content:"gYmNyz,"}/*!sc*/ .iFlflv{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;color:#191919;margin:0;padding:2.4rem 0 2.4rem 1.6rem;position:relative;-webkit-transition:color 0.2s;transition:color 0.2s;}/*!sc*/ .iFlflv::before{border-style:solid;border-width:0.1em 0.1em 0 0;content:'';display:inline-block;height:1.4rem;right:3rem;top:calc(50% - 0.83rem);position:absolute;vertical-align:top;width:1.4rem;-webkit-transform:rotate(135deg);-ms-transform:rotate(135deg);transform:rotate(135deg);-webkit-transition:-webkit-transform 0.4s ease;-webkit-transition:transform 0.4s ease;transition:transform 0.4s ease;}/*!sc*/ @media screen and (min-width:900px){.iFlflv{padding-left:6.4rem;}.iFlflv:before{right:7rem;}}/*!sc*/ data-styled.g184[id="sc-48604b4d-5"]{content:"iFlflv,"}/*!sc*/ .GBRPY{overflow:hidden;height:auto;-webkit-transition:max-height 0.3s ease-out;transition:max-height 0.3s ease-out;padding-left:1.6rem;background:#F6F7FA;height:0;max-height:0;}/*!sc*/ @media screen and (min-width:900px){.GBRPY{padding-left:6.4rem;}}/*!sc*/ data-styled.g185[id="sc-48604b4d-6"]{content:"GBRPY,"}/*!sc*/ .kpcslJ:not(:last-of-type){margin-bottom:3.2rem;}/*!sc*/ .kpcslJ:last-of-type{padding-bottom:1.6rem;}/*!sc*/ data-styled.g186[id="sc-48604b4d-7"]{content:"kpcslJ,"}/*!sc*/ .iTmePz{font-family:Aeonik Mono,monospace;font-size:1.4rem;line-height:2rem;font-weight:500;-webkit-letter-spacing:0.14rem;-moz-letter-spacing:0.14rem;-ms-letter-spacing:0.14rem;letter-spacing:0.14rem;text-transform:uppercase;color:#8c929c;margin:0 0 2rem;padding-top:3.2rem;}/*!sc*/ data-styled.g187[id="sc-48604b4d-8"]{content:"iTmePz,"}/*!sc*/ .hERQyI{list-style:none;padding:0;margin:0;}/*!sc*/ data-styled.g189[id="sc-48604b4d-10"]{content:"hERQyI,"}/*!sc*/ .jMXYKX{font-family:Aeonik,sans-serif;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;margin-bottom:2rem;}/*!sc*/ .jMXYKX a{color:#42464d;display:inline-block;width:100%;}/*!sc*/ .jMXYKX a:hover{color:#3F59E4;}/*!sc*/ data-styled.g190[id="sc-48604b4d-11"]{content:"jMXYKX,"}/*!sc*/ .qpVDs{border:none;color:#191919;background:none;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;}/*!sc*/ data-styled.g191[id="sc-48604b4d-12"]{content:"qpVDs,"}/*!sc*/ .gbXkOr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g192[id="sc-48604b4d-13"]{content:"gbXkOr,"}/*!sc*/ .kJVMgi{font-weight:500;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;margin:0 0 0 0.8rem;}/*!sc*/ data-styled.g193[id="sc-48604b4d-14"]{content:"kJVMgi,"}/*!sc*/ .eFutmd{-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;width:100%;padding:1.6rem;margin:0 auto;border-top:0.1rem solid #C5C5C5;position:fixed;bottom:0;left:0;right:0;text-align:center;background:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:900px){.eFutmd{padding:3.2rem 6.4rem;}}/*!sc*/ data-styled.g194[id="sc-48604b4d-15"]{content:"eFutmd,"}/*!sc*/ .bLoTPP{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:1.6rem;}/*!sc*/ data-styled.g197[id="sc-48604b4d-18"]{content:"bLoTPP,"}/*!sc*/ .eUSAyU{background:#242424;color:#FFFEFA;width:100%;margin:auto;font-size:1.4rem;line-height:2rem;text-align:left;font-family:Aeonik,sans-serif;border-bottom:0.1rem solid #41454C;border-bottom:0.2rem solid;border-image-slice:1;border-image-source:linear-gradient( 135deg,#4cb7a3 0%,#3f59e4 50%,#4016a0 100% );}/*!sc*/ @media screen and (min-width:900px){.eUSAyU{text-align:left;}}/*!sc*/ data-styled.g199[id="sc-5beafa8a-0"]{content:"eUSAyU,"}/*!sc*/ .iGZnhq{width:100%;max-width:144rem;min-height:4rem;margin:auto;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:1rem 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.iGZnhq{padding:1rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.iGZnhq{padding:0 6.4rem;}}/*!sc*/ data-styled.g200[id="sc-5beafa8a-1"]{content:"iGZnhq,"}/*!sc*/ .cWIfaw{-webkit-flex:1;-ms-flex:1;flex:1;padding:0;cursor:pointer;}/*!sc*/ @media screen and (min-width:900px){.cWIfaw{padding:0;}}/*!sc*/ @media screen and (min-width:1200px){.cWIfaw{padding:0.9rem 0;margin-right:2.4rem;}}/*!sc*/ .cWIfaw:hover .sc-5beafa8a-4{color:#B6CAFF;}/*!sc*/ data-styled.g204[id="sc-5beafa8a-5"]{content:"cWIfaw,"}/*!sc*/ .itVfed{display:none;}/*!sc*/ @media screen and (min-width:1200px){.itVfed{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}}/*!sc*/ data-styled.g205[id="sc-5beafa8a-6"]{content:"itVfed,"}/*!sc*/ .hDyrOj{color:#FFFEFA;cursor:pointer;font-weight:500;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .hDyrOj:focus{outline:none;}/*!sc*/ .hDyrOj:hover,.hDyrOj:focus{color:#B6CAFF;}/*!sc*/ data-styled.g206[id="sc-5beafa8a-7"]{content:"hDyrOj,"}/*!sc*/ .eVwRHc{cursor:pointer;color:#FFFEFA;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .eVwRHc svg{stroke:#FFFEFA;}/*!sc*/ .eVwRHc:hover,.eVwRHc:focus-within{color:#B6CAFF;}/*!sc*/ .eVwRHc:hover svg,.eVwRHc:focus-within svg{stroke:#B6CAFF;}/*!sc*/ data-styled.g207[id="sc-5beafa8a-8"]{content:"eVwRHc,"}/*!sc*/ .fqPPiV{line-height:2rem;}/*!sc*/ .fqPPiV:hover{color:#493FA3;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g208[id="sc-5beafa8a-9"]{content:"fqPPiV,"}/*!sc*/ .dcJoIk{height:100%;width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g209[id="sc-5beafa8a-10"]{content:"dcJoIk,"}/*!sc*/ .bpYUYF{font-weight:500;-webkit-appearance:none;-moz-appearance:none;appearance:none;height:100%;background-color:transparent;border:none;margin:0;font-family:inherit;font-size:inherit;cursor:inherit;line-height:inherit;color:inherit;z-index:1;outline:none;padding-left:2rem;padding-right:1.6rem;text-align:center;width:100%;}/*!sc*/ data-styled.g210[id="sc-5beafa8a-11"]{content:"bpYUYF,"}/*!sc*/ .jettYQ{left:0;pointer-events:none;position:absolute;top:calc(50% - 1rem);z-index:0;}/*!sc*/ data-styled.g211[id="sc-5beafa8a-12"]{content:"jettYQ,"}/*!sc*/ .jQtGvo{-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:100%;pointer-events:none;position:absolute;right:0;z-index:0;}/*!sc*/ data-styled.g212[id="sc-5beafa8a-13"]{content:"jQtGvo,"}/*!sc*/ .iCBipV{height:10.4rem;width:100%;margin:0 auto;}/*!sc*/ @media screen and (min-width:1200px){.iCBipV{display:none;}}/*!sc*/ data-styled.g214[id="sc-dd041119-1"]{content:"iCBipV,"}/*!sc*/ .ICWnA{height:0.1rem;position:absolute;visibility:hidden;top:0;}/*!sc*/ data-styled.g215[id="sc-dd041119-2"]{content:"ICWnA,"}/*!sc*/ .gEbdNA{position:fixed;top:0;left:0;width:100%;z-index:1000;color:#191919;}/*!sc*/ data-styled.g216[id="sc-dd041119-3"]{content:"gEbdNA,"}/*!sc*/ .qYilV{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g217[id="sc-dd041119-4"]{content:"qYilV,"}/*!sc*/ .jrguPz{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g218[id="sc-dd041119-5"]{content:"jrguPz,"}/*!sc*/ .hQZcnp{-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;display:none;width:100%;max-width:100%;margin:auto;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.hQZcnp{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ .hQZcnp:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g219[id="sc-dd041119-6"]{content:"hQZcnp,"}/*!sc*/ .YCXld{max-width:131.2rem;width:100%;margin:auto;-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.YCXld{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;padding:0;}}/*!sc*/ .YCXld:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g220[id="sc-dd041119-7"]{content:"YCXld,"}/*!sc*/ .ixaIYF{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g221[id="sc-dd041119-8"]{content:"ixaIYF,"}/*!sc*/ .bdkiZo{max-width:144rem;width:100%;margin:auto;padding:1.2rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;background-color:#FFFEFA;height:6.4rem;box-shadow:inset 0 -0.1rem 0 #C5C5C5;position:relative;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:900px){.bdkiZo{padding:1.6rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.bdkiZo{display:none;}}/*!sc*/ data-styled.g222[id="sc-dd041119-9"]{content:"bdkiZo,"}/*!sc*/ .jBKEmn{justify-self:flex-end;padding:2rem 0;}/*!sc*/ data-styled.g223[id="sc-dd041119-10"]{content:"jBKEmn,"}/*!sc*/ .bjnXGr{-webkit-appearance:none;-moz-appearance:none;appearance:none;border:0;background:transparent;height:2.4rem;margin:0;padding:0;position:relative;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;cursor:pointer;-webkit-transition:all 0.5s ease-in-out;transition:all 0.5s ease-in-out;}/*!sc*/ data-styled.g224[id="sc-dd041119-11"]{content:"bjnXGr,"}/*!sc*/ .dImpXN{width:2.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;margin-top:1.2rem;}/*!sc*/ .dImpXN::before,.dImpXN::after{content:'';position:absolute;width:2.2rem;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;}/*!sc*/ .dImpXN::before{-webkit-transform:translateY(-0.7rem);-ms-transform:translateY(-0.7rem);transform:translateY(-0.7rem);}/*!sc*/ .dImpXN::after{-webkit-transform:translateY(0.7rem);-ms-transform:translateY(0.7rem);transform:translateY(0.7rem);}/*!sc*/ data-styled.g225[id="sc-dd041119-12"]{content:"dImpXN,"}/*!sc*/ .gNXkEw{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0;list-style:none;margin:0;line-height:2.4rem;}/*!sc*/ data-styled.g226[id="sc-dd041119-13"]{content:"gNXkEw,"}/*!sc*/ .cSswwm{color:#191919;cursor:initial;padding-top:0.9rem;width:104.4rem;position:absolute;left:0;right:0;margin:-0.1rem auto 0;top:6.4rem;display:inline-block;visibility:hidden;opacity:0;-webkit-transform:translateX(-1.6rem);-ms-transform:translateX(-1.6rem);transform:translateX(-1.6rem);-webkit-transition:visibility 0s,opacity 0.2s linear,-webkit-transform 0.2s linear;-webkit-transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;}/*!sc*/ data-styled.g227[id="sc-dd041119-14"]{content:"cSswwm,"}/*!sc*/ .gUdygj{position:relative;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .gUdygj::after{content:'';-webkit-transition:border-color 0.2s ease,-webkit-transform 0.2s ease;-webkit-transition:border-color 0.2s ease,transform 0.2s ease;transition:border-color 0.2s ease,transform 0.2s ease;width:100%;height:0.2rem;border-bottom:0.2rem solid transparent;display:block;bottom:-1.6rem;position:absolute;left:0;-webkit-transform:scale(0,1);-ms-transform:scale(0,1);transform:scale(0,1);}/*!sc*/ data-styled.g228[id="sc-dd041119-15"]{content:"gUdygj,"}/*!sc*/ .dXokKX{font-family:Aeonik,sans-serif;padding:1.6rem 1.8rem;cursor:pointer;font-size:1.6rem;font-weight:500;line-height:3.2rem;-webkit-letter-spacing:0.02rem;-moz-letter-spacing:0.02rem;-ms-letter-spacing:0.02rem;letter-spacing:0.02rem;}/*!sc*/ .dXokKX .sc-dd041119-15 > svg{stroke:#191919;-webkit-transition:stroke 0.2s ease;transition:stroke 0.2s ease;padding-left:0.4rem;}/*!sc*/ .dXokKX:hover{color:#3F59E4;}/*!sc*/ .dXokKX:hover .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .dXokKX:hover .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .dXokKX:hover .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .dXokKX:hover .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .dXokKX:focus-visible{color:#3F59E4;}/*!sc*/ .dXokKX:focus-visible .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .dXokKX:focus-visible .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .dXokKX:focus-visible .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .dXokKX:focus-visible .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .dXokKX:focus-within{color:#3F59E4;}/*!sc*/ .dXokKX:focus-within .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .dXokKX:focus-within .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .dXokKX:focus-within .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .dXokKX:focus-within .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ data-styled.g229[id="sc-dd041119-16"]{content:"dXokKX,"}/*!sc*/ .iWFzRI{background:rgba(255,255,255,0.88);-webkit-backdrop-filter:blur(20px);backdrop-filter:blur(20px);border:0.1rem solid #C5C5C5;border-radius:1rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g230[id="sc-dd041119-17"]{content:"iWFzRI,"}/*!sc*/ .kMedCs{min-width:31.1rem;width:31.1rem;padding:3.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ data-styled.g235[id="sc-8f844919-0"]{content:"kMedCs,"}/*!sc*/ .fYgQyZ{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .eEFInE{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g236[id="sc-8f844919-1"]{content:"fYgQyZ,eEFInE,"}/*!sc*/ .KlUAi{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .gQSXyr{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g237[id="sc-8f844919-2"]{content:"KlUAi,gQSXyr,"}/*!sc*/ .kwTHWS{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem;width:100%;min-width:33%;}/*!sc*/ .fSUhoO{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem 0;}/*!sc*/ .dgugYr{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:0;width:100%;min-width:33%;}/*!sc*/ data-styled.g238[id="sc-8f844919-3"]{content:"kwTHWS,fSUhoO,dgugYr,"}/*!sc*/ .dLYyDO{list-style:none;padding:0;height:100%;}/*!sc*/ data-styled.g240[id="sc-c4163730-1"]{content:"dLYyDO,"}/*!sc*/ .fIsAbH{margin:0;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-family:Aeonik,sans-serif;font-weight:500;font-size:1.4rem;line-height:2.4rem;color:#1E212A;}/*!sc*/ .fIsAbH + li{margin-top:1.6rem;}/*!sc*/ .fIsAbH svg{margin-right:1.4rem;min-width:2.4rem;}/*!sc*/ .fIsAbH a{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;width:100%;}/*!sc*/ .fIsAbH a:hover{color:#3F59E4;}/*!sc*/ .fIsAbH:last-of-type{margin-bottom:3.2rem;}/*!sc*/ data-styled.g241[id="sc-c4163730-2"]{content:"fIsAbH,"}/*!sc*/ .bmElMS{border-top:0.1rem solid #C5C5C5;padding-top:2.4rem;}/*!sc*/ data-styled.g243[id="sc-c4163730-4"]{content:"bmElMS,"}/*!sc*/ .hClFVD{list-style:none;padding:0;display:grid;grid-template-columns:1fr;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;height:100%;}/*!sc*/ data-styled.g244[id="sc-31a2510-0"]{content:"hClFVD,"}/*!sc*/ .kgkoMp{margin:0;padding:3.2rem;height:14.47rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .kgkoMp + li{border-top:0.1rem solid #C5C5C5;}/*!sc*/ .kgkoMp div{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .kgkoMp a{color:#5a5f66;width:100%;}/*!sc*/ .kgkoMp a svg{margin-right:1.4rem;}/*!sc*/ .kgkoMp a p{margin:0;}/*!sc*/ .kgkoMp a p:first-child{font-weight:500;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;}/*!sc*/ .kgkoMp a:hover p{color:#5a5f66;}/*!sc*/ .kgkoMp a:hover p:first-child{color:#3F59E4;}/*!sc*/ data-styled.g245[id="sc-31a2510-1"]{content:"kgkoMp,"}/*!sc*/ .IXeEz a{display:block;color:#1E212A;}/*!sc*/ .IXeEz a:hover{color:#3F59E4;}/*!sc*/ .IXeEz a span{font-weight:500;}/*!sc*/ .IXeEz a + a{margin-top:2.4rem;}/*!sc*/ .IXeEz a + p{margin-top:3.6rem;}/*!sc*/ data-styled.g246[id="sc-8583e179-0"]{content:"IXeEz,"}/*!sc*/ .hpMGfJ{padding:0 3.2rem;display:block;}/*!sc*/ .hpMGfJ:hover p:last-of-type{color:#3F59E4;}/*!sc*/ .hpMGfJ:first-child{margin-bottom:2.4rem;}/*!sc*/ data-styled.g250[id="sc-1e1df8de-0"]{content:"hpMGfJ,"}/*!sc*/ .egMnOm{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g251[id="sc-1e1df8de-1"]{content:"egMnOm,"}/*!sc*/ .dekmZq{border-radius:0.8rem;width:100%;max-width:13rem;height:9rem;margin-right:1.9rem;object-fit:cover;}/*!sc*/ data-styled.g253[id="sc-1e1df8de-3"]{content:"dekmZq,"}/*!sc*/ .cdzIQC{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g254[id="sc-4b4277c0-0"]{content:"cdzIQC,"}/*!sc*/ .fhOriK{padding:3.2rem 3.2rem 0 3.2rem;}/*!sc*/ data-styled.g255[id="sc-4b4277c0-1"]{content:"fhOriK,"}/*!sc*/ .gwYtlx{background:#fff;padding-top:1.2rem;}/*!sc*/ data-styled.g256[id="sc-da5983f0-0"]{content:"gwYtlx,"}/*!sc*/ .kwotlH{width:100%;max-width:144rem;margin:auto;font-family:Inter,sans-serif;padding:0 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.kwotlH{padding:0 6.4rem;}}/*!sc*/ data-styled.g257[id="sc-da5983f0-1"]{content:"kwotlH,"}/*!sc*/ .wzIcC{display:grid;grid-template-columns:1fr 1fr;grid-row-gap:4.8rem;margin:4.8rem auto auto;}/*!sc*/ @media screen and (min-width:900px){.wzIcC{margin:6.4rem auto auto;}}/*!sc*/ @media screen and (min-width:1200px){.wzIcC{grid-template-columns:1fr 1fr 1fr 1fr;grid-template-rows:1fr 1fr;margin:8rem auto auto;max-width:131.2rem;}}/*!sc*/ data-styled.g258[id="sc-da5983f0-2"]{content:"wzIcC,"}/*!sc*/ .bLUmS{list-style:none;margin-bottom:0;padding-left:0;}/*!sc*/ data-styled.g259[id="sc-da5983f0-3"]{content:"bLUmS,"}/*!sc*/ .dVkxMv{font-weight:500;font-size:1.4rem;line-height:3.2rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;padding-right:3.2rem;}/*!sc*/ .dVkxMv a{color:#1e212a;}/*!sc*/ .dVkxMv a span{background:linear-gradient( 59deg,#4016a0 -18.49%,#3f59e4 38.74%,#4cb7a3 106.36% );padding:0.1rem 0.6rem;border-radius:0.4rem;margin-left:0.8rem;color:#fff;font-weight:600;}/*!sc*/ .dVkxMv a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.dVkxMv p::before{content:'';margin-right:0.8rem;border-left:0.1rem solid #8c929c;height:1.2rem;display:inline-block;}}/*!sc*/ data-styled.g261[id="sc-da5983f0-5"]{content:"dVkxMv,"}/*!sc*/ .cdKcsR{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ .cdKcsR > ul{-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g262[id="sc-da5983f0-6"]{content:"cdKcsR,"}/*!sc*/ .youMP{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;display:none;}/*!sc*/ @media screen and (min-width:900px){.youMP{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin-left:0;}}/*!sc*/ .lRjLk{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;}/*!sc*/ @media screen and (min-width:900px){.lRjLk{display:none;}}/*!sc*/ data-styled.g263[id="sc-da5983f0-7"]{content:"youMP,lRjLk,"}/*!sc*/ .eqlDTL{height:2.4rem;}/*!sc*/ .eqlDTL:hover{cursor:pointer;}/*!sc*/ .eqlDTL:hover path{fill:#635dff;}/*!sc*/ data-styled.g264[id="sc-da5983f0-8"]{content:"eqlDTL,"}/*!sc*/ .hyvxTC{padding:2.4rem 0 0;position:relative;margin-top:4.8rem;}/*!sc*/ @media screen and (min-width:900px){.hyvxTC{display:none;}}/*!sc*/ data-styled.g265[id="sc-da5983f0-9"]{content:"hyvxTC,"}/*!sc*/ .jqMtSJ{display:none;}/*!sc*/ @media screen and (min-width:900px){.jqMtSJ{display:block;border-top:0.1rem solid #bdc4cf;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;padding:2.4rem 0;position:relative;margin-top:4.8rem;}}/*!sc*/ @media screen and (min-width:1200px){.jqMtSJ{margin-top:10rem;}}/*!sc*/ data-styled.g266[id="sc-da5983f0-10"]{content:"jqMtSJ,"}/*!sc*/ .esTuHb{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin:2.4rem 1.6rem;}/*!sc*/ data-styled.g267[id="sc-da5983f0-11"]{content:"esTuHb,"}/*!sc*/ .fZZTui{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-weight:500;color:#8c929c;grid-gap:0.6rem;font-size:1.2rem;line-height:1.8rem;-webkit-flex:1;-ms-flex:1;flex:1;-webkit-flex-flow:wrap;-ms-flex-flow:wrap;flex-flow:wrap;}/*!sc*/ .fZZTui img{max-width:4rem;}/*!sc*/ .fZZTui a{color:#8c929c;}/*!sc*/ .fZZTui a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.fZZTui{-webkit-box-pack:end;-webkit-justify-content:flex-end;-ms-flex-pack:end;justify-content:flex-end;}}/*!sc*/ @media screen and (min-width:1200px){.fZZTui{font-size:1.4rem;line-height:2.2rem;}}/*!sc*/ data-styled.g268[id="sc-da5983f0-12"]{content:"fZZTui,"}/*!sc*/ .fYjwsD{cursor:pointer;height:100%;color:#1e212a;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .fYjwsD svg{stroke:#1e212a;}/*!sc*/ .fYjwsD:hover{color:#635dff;}/*!sc*/ .fYjwsD:hover svg{stroke:#635dff;}/*!sc*/ data-styled.g269[id="sc-da5983f0-13"]{content:"fYjwsD,"}/*!sc*/ .cxcZqY{visibility:hidden;opacity:0;position:absolute;-webkit-transition:opacity 0.2s ease;transition:opacity 0.2s ease;left:-3.4rem;top:-20.2rem;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.cxcZqY{left:-2.4rem;}}/*!sc*/ data-styled.g270[id="sc-da5983f0-14"]{content:"cxcZqY,"}/*!sc*/ .iYKLJh{min-width:13.4rem;margin-top:0;background:#fff;color:#635dff;box-shadow:0 0 0.8rem rgba(0,0,0,0.25);border-radius:0.8rem;padding:1.6rem 2.4rem;list-style:none;}/*!sc*/ data-styled.g271[id="sc-da5983f0-15"]{content:"iYKLJh,"}/*!sc*/ .chqEKw{line-height:2.8rem;}/*!sc*/ .chqEKw:hover{color:#635dff;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g272[id="sc-da5983f0-16"]{content:"chqEKw,"}/*!sc*/ .fpYidZ{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;z-index:1;font-size:1.2rem;}/*!sc*/ @media screen and (min-width:1200px){.fpYidZ{font-size:1.4rem;}}/*!sc*/ .fpYidZ:hover .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fpYidZ:focus-visible .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fpYidZ:focus-within .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ data-styled.g273[id="sc-da5983f0-17"]{content:"fpYidZ,"}/*!sc*/ .iWRmar{margin-left:0.8rem;font-weight:500;}/*!sc*/ data-styled.g274[id="sc-da5983f0-18"]{content:"iWRmar,"}/*!sc*/ .fEZVQw{padding:4rem 0;display:block;text-align:center;background-color:#f1f3f7;}/*!sc*/ @media screen and (min-width:900px){.fEZVQw{text-align:left;padding:6rem 0;}}/*!sc*/ @media screen and (min-width:1200px){.fEZVQw{padding:8rem 2rem;}}/*!sc*/ data-styled.g278[id="sc-3e4086c7-0"]{content:"fEZVQw,"}/*!sc*/ .iltjHZ{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0 2rem;margin:0 auto;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:1200px){.iltjHZ{max-width:121.6rem;padding:0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:3.2rem;}}/*!sc*/ data-styled.g279[id="sc-3e4086c7-1"]{content:"iltjHZ,"}/*!sc*/ .SBvAU{color:#1e212a;font-family:SpaceGrotesk,sans-serif;font-size:2.8rem;line-height:3.6rem;-webkit-letter-spacing:-0.0375rem;-moz-letter-spacing:-0.0375rem;-ms-letter-spacing:-0.0375rem;letter-spacing:-0.0375rem;font-weight:600;padding:0;margin:0 auto 3.2rem;display:block;text-align:center;}/*!sc*/ .SBvAU p{margin:0;}/*!sc*/ @media screen and (min-width:900px){.SBvAU{font-size:3.2rem;line-height:4rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;}}/*!sc*/ @media screen and (min-width:1200px){.SBvAU{margin:0;max-width:100%;font-size:4.2rem;line-height:5.2rem;-webkit-letter-spacing:-0.1rem;-moz-letter-spacing:-0.1rem;-ms-letter-spacing:-0.1rem;letter-spacing:-0.1rem;text-align:left;}}/*!sc*/ data-styled.g280[id="sc-3e4086c7-2"]{content:"SBvAU,"}/*!sc*/ .huPKqg{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;width:100%;}/*!sc*/ @media screen and (min-width:1200px){.huPKqg{-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;width:auto;}}/*!sc*/ data-styled.g281[id="sc-3e4086c7-3"]{content:"huPKqg,"}/*!sc*/ .cSKiaU{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:#635DFF;}/*!sc*/ .cSKiaU:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ .cSKiaU:hover{color:#ffffff;background-color:#564ed1;}/*!sc*/ @media screen and (min-width:1200px){.cSKiaU{margin:0 0 0 3.2rem;font-size:1.4rem;}.cSKiaU:not(:last-child){margin:0;}}/*!sc*/ .kEPccb{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:transparent;color:#1E212A;border:0.15rem solid #606060;}/*!sc*/ .kEPccb:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ @media screen and (min-width:1200px){.kEPccb{margin:0 0 0 3.2rem;font-size:1.4rem;}.kEPccb:not(:last-child){margin:0;}}/*!sc*/ data-styled.g282[id="sc-3e4086c7-4"]{content:"cSKiaU,kEPccb,"}/*!sc*/ .gBAyLy{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ data-styled.g283[id="sc-59b87673-0"]{content:"gBAyLy,"}/*!sc*/ .dcytot{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;height:3.4rem;background-color:#fff;border:0.1rem solid #ced2d4;border-radius:0.3rem;overflow-x:scroll;padding-inline-start:0;margin-block-start:0;margin-block-end:0;}/*!sc*/ @media screen and (min-width:900px){.dcytot{overflow-x:unset;}}/*!sc*/ data-styled.g284[id="sc-59b87673-1"]{content:"dcytot,"}/*!sc*/ .kVpoAe{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;width:4.3rem;border:0 solid #ced2d4;font-size:1.6rem;line-height:2.8rem;color:#333;-webkit-transition:background-color 0.2s ease 0s;transition:background-color 0.2s ease 0s;background-color:#e8e8e8 !important;border-width:0 0.1rem;}/*!sc*/ .kVpoAe:hover{cursor:pointer;background-color:#e8e8e885;}/*!sc*/ .kVpoAe:first-child{border-left-width:0;}/*!sc*/ .kVpoAe:last-child{border-right-width:0;}/*!sc*/ .joqeqJ{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;width:4.3rem;border:0 solid #ced2d4;font-size:1.6rem;line-height:2.8rem;color:#333;-webkit-transition:background-color 0.2s ease 0s;transition:background-color 0.2s ease 0s;}/*!sc*/ .joqeqJ:hover{cursor:pointer;background-color:#e8e8e885;}/*!sc*/ .joqeqJ:first-child{border-left-width:0;}/*!sc*/ .joqeqJ:last-child{border-right-width:0;}/*!sc*/ data-styled.g285[id="sc-59b87673-2"]{content:"kVpoAe,joqeqJ,"}/*!sc*/ .dCmHBC{text-align:center;max-width:121.6rem;margin:0 auto 12rem;padding-top:0;}/*!sc*/ @media screen and (min-width:1200px){.dCmHBC{padding-top:10.7rem;}}/*!sc*/ data-styled.g286[id="sc-527f19d-0"]{content:"dCmHBC,"}/*!sc*/ .dJqrul{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;margin:4rem 2rem;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;gap:4rem;}/*!sc*/ @media screen and (min-width:900px){.dJqrul{margin:8rem 2rem;}}/*!sc*/ @media screen and (min-width:1200px){.dJqrul{margin:8rem 0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:0;}}/*!sc*/ data-styled.g287[id="sc-527f19d-1"]{content:"dJqrul,"}/*!sc*/ .hKxkNd{display:grid;grid-template-columns:repeat(auto-fill,28rem);grid-column-gap:3.2rem;grid-row-gap:4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 4rem;}/*!sc*/ @media screen and (min-width:900px){.hKxkNd{grid-row-gap:6.4rem;margin:0 0 6rem;}}/*!sc*/ data-styled.g289[id="sc-527f19d-3"]{content:"hKxkNd,"}/*!sc*/ .jTmfPd{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 6.4rem;-webkit-flex-direction:column-reverse;-ms-flex-direction:column-reverse;flex-direction:column-reverse;row-gap:4.2rem;}/*!sc*/ @media screen and (min-width:900px){.jTmfPd{-webkit-align-items:baseline;-webkit-box-align:baseline;-ms-flex-align:baseline;align-items:baseline;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ @media screen and (min-width:1200px){.jTmfPd{margin:0 0 6rem;border-bottom:0.5px solid #BDC4CF;margin:0 0 6.4rem;}}/*!sc*/ data-styled.g290[id="sc-527f19d-4"]{content:"jTmfPd,"}/*!sc*/ .JDGQW{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;gap:3.4rem;}/*!sc*/ data-styled.g291[id="sc-527f19d-5"]{content:"JDGQW,"}/*!sc*/ .fhWpyk{max-width:28rem;text-align:left;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;position:relative;}/*!sc*/ data-styled.g292[id="sc-527f19d-6"]{content:"fhWpyk,"}/*!sc*/ .eQbjVs{width:2.4rem;position:absolute;left:1.5rem;}/*!sc*/ data-styled.g293[id="sc-527f19d-7"]{content:"eQbjVs,"}/*!sc*/ .bTzeuX{border:0.1rem solid #8c929c;border-radius:0.8rem;width:100%;font-weight:400;font-size:1.4rem;line-height:2.4rem;font-family:Inter,sans-serif;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;height:4rem;padding:0.8rem 0 0.8rem 5rem;}/*!sc*/ .bTzeuX::-webkit-input-placeholder{color:#5a5f66;}/*!sc*/ .bTzeuX::-moz-placeholder{color:#5a5f66;}/*!sc*/ .bTzeuX:-ms-input-placeholder{color:#5a5f66;}/*!sc*/ .bTzeuX::placeholder{color:#5a5f66;}/*!sc*/ .bTzeuX:focus{outline:none !important;border:0.2rem solid #93c7dd;}/*!sc*/ @media screen and (min-width:900px){.bTzeuX{padding:0.8rem 0 0.8rem 5rem;}}/*!sc*/ data-styled.g294[id="sc-527f19d-8"]{content:"bTzeuX,"}/*!sc*/ .ebfmSm{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g295[id="sc-527f19d-9"]{content:"ebfmSm,"}/*!sc*/ .jjoxhi{background:url(https://cdn.auth0.com/website/resources/select-arrow.svg) 1.4rem no-repeat;background-position:100%;border:none;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;color:#42464d;padding:0 2.4rem 0 1rem;position:relative;margin:0;text-transform:capitalize;font-size:1.4rem;line-height:2.2rem;font-weight:500;font-family:Inter,sans-serif;cursor:pointer;-webkit-appearance:none;-moz-appearance:none;appearance:none;outline:none;}/*!sc*/ data-styled.g296[id="sc-527f19d-10"]{content:"jjoxhi,"}/*!sc*/ .zdKOy{max-width:15rem;border-radius:0.3rem;-webkit-transition:all 0.6s ease;transition:all 0.6s ease;will-change:transform;}/*!sc*/ data-styled.g297[id="sc-527f19d-11"]{content:"zdKOy,"}/*!sc*/ .bBBbBc{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;text-align:left;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;will-change:transform;cursor:pointer;}/*!sc*/ .bBBbBc:hover{-webkit-transform:scale(1.02);-ms-transform:scale(1.02);transform:scale(1.02);}/*!sc*/ .bBBbBc:hover .sc-527f19d-11{-webkit-transform:scale(1.1);-ms-transform:scale(1.1);transform:scale(1.1);}/*!sc*/ data-styled.g298[id="sc-527f19d-12"]{content:"bBBbBc,"}/*!sc*/ .kfUZFg{height:18.6rem;overflow:hidden;background:linear-gradient(0deg,#bdc4cf,#dadfe8);border-radius:0.8rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;padding-top:2rem;}/*!sc*/ data-styled.g299[id="sc-527f19d-13"]{content:"kfUZFg,"}/*!sc*/ .iZIrXB{font-size:2rem;line-height:3.2rem;font-weight:500;font-family:Inter,sans-serif;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#333333;margin:0;}/*!sc*/ data-styled.g300[id="sc-527f19d-14"]{content:"iZIrXB,"}/*!sc*/ .cvgIOz{font-size:1.3rem;line-height:2.3rem;font-family:SpaceGrotesk,sans-serif;font-feature-settings:'pnum' on,'lnum' on,'ordn' on,'ss03' on,'ss04' on,'kern' off;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;text-transform:uppercase;color:#727272;margin:1rem 0 0.8rem 0;}/*!sc*/ @media screen and (min-width:900px){.cvgIOz{margin:2rem 0 0.8rem 0;}}/*!sc*/ data-styled.g301[id="sc-527f19d-15"]{content:"cvgIOz,"}/*!sc*/ .LeCub{list-style:none;line-height:unset;padding:0;margin:0 0 2.4rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:3.3rem;border-bottom:0.05rem solid #bdc4cf;overflow-x:scroll;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.LeCub{margin:0;border-bottom:none;overflow-x:unset;}}/*!sc*/ data-styled.g303[id="sc-527f19d-17"]{content:"LeCub,"}/*!sc*/ .kpYltW{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:none;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .kpYltW a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.kpYltW{padding-bottom:2.4rem;}}/*!sc*/ .gIOkMI{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:0.2rem solid #1E212A;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .gIOkMI a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.gIOkMI{padding-bottom:2.4rem;}}/*!sc*/ data-styled.g304[id="sc-527f19d-18"]{content:"kpYltW,gIOkMI,"}/*!sc*/ </style></head><body><div id="__next"><!--$--><!--/$--><div class="sc-dd041119-2 ICWnA"></div><div class="sc-dd041119-1 iCBipV"></div><header class="sc-dd041119-3 gEbdNA"><div class="sc-5beafa8a-0 eUSAyU"><div class="sc-5beafa8a-1 iGZnhq"><a class="sc-5beafa8a-5 cWIfaw"></a><div class="sc-5beafa8a-6 itVfed"><a href="/api/auth/login?redirectTo=dashboard" rel="external" class="sc-5beafa8a-7 hDyrOj">Login</a><div class="sc-5beafa8a-8 eVwRHc"><div class="sc-5beafa8a-10 dcJoIk"><span class="sc-5beafa8a-12 jettYQ"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg></span><select aria-label="Language selector" class="sc-5beafa8a-11 bpYUYF"><option value="de" class="sc-5beafa8a-9 fqPPiV">Deutsch</option><option value="en" class="sc-5beafa8a-9 fqPPiV" selected="">English</option><option value="fr" class="sc-5beafa8a-9 fqPPiV">Français</option><option value="es" class="sc-5beafa8a-9 fqPPiV">Español</option><option value="pt" class="sc-5beafa8a-9 fqPPiV">Português</option><option value="ja" class="sc-5beafa8a-9 fqPPiV">日本語</option></select><span class="sc-5beafa8a-13 jQtGvo"><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></span></div></div></div></div></div><nav aria-label="Mobile nav" class="sc-dd041119-9 bdkiZo"><a rel="external" href="/" aria-label="Auth0 logo" class="sc-dd041119-5 jrguPz"><svg xmlns="http://www.w3.org/2000/svg" width="106" height="40" viewBox="0 0 106 40" fill="none"><path d="M1.69096 17.4795C6.93608 16.6184 11.0487 12.5058 11.9098 7.26068L12.3326 4.70858C12.4108 4.21277 12.009 3.77959 11.5079 3.81612C7.51539 4.12404 3.75249 5.44967 1.67009 6.30037C0.662823 6.71268 0 7.69386 0 8.78985V16.8532C0 17.3282 0.422753 17.6883 0.892465 17.61L1.69096 17.4795Z" fill="#191919"></path><path d="M14.4356 7.26056C15.2968 12.5057 19.4094 16.6183 24.6545 17.4794L25.453 17.6099C25.9227 17.6882 26.3454 17.3281 26.3454 16.8531V8.78973C26.3454 7.69895 25.6826 6.71777 24.6753 6.30025C22.5982 5.44433 18.83 4.12392 14.8375 3.816C14.3365 3.77947 13.9294 4.21265 14.0129 4.70846L14.4356 7.26056Z" fill="#191919"></path><path d="M24.6589 20.0112C19.4138 20.8723 15.3012 24.9849 14.44 30.23L13.9181 35.209C13.8712 35.6578 14.367 35.9762 14.7428 35.7257C14.7428 35.7257 14.748 35.7257 14.7532 35.7205C18.0412 33.5024 25.5461 27.6936 26.2872 20.4392C26.3238 20.0843 26.0054 19.792 25.6557 19.8494L24.6641 20.0112H24.6589Z" fill="#191919"></path><path d="M11.9075 30.2277C11.0464 24.9826 6.9338 20.87 1.68868 20.0088L0.618783 19.8314C0.305641 19.7792 0.0238052 20.0401 0.0551193 20.3585C0.759688 27.6547 8.36904 33.5 11.6831 35.7181C12.0276 35.9477 12.4816 35.6711 12.4399 35.2588L11.9128 30.2225L11.9075 30.2277Z" fill="#191919"></path><path d="M62.7942 13.954H60.297C60.1456 13.954 60.0267 14.073 60.0267 14.2243V21.4295C60.0267 22.3105 59.8807 23.0835 59.5889 23.7483C59.297 24.4132 58.8862 24.9213 58.3511 25.2672C57.8159 25.6132 57.1835 25.7861 56.4538 25.7861C55.4052 25.7861 54.616 25.4402 54.0917 24.7483C53.5674 24.0564 53.3026 23.0619 53.3026 21.77V14.2243C53.3026 14.073 53.1837 13.954 53.0323 13.954H50.5081C50.3567 13.954 50.2378 14.073 50.2378 14.2243V22.0781C50.2378 23.2943 50.3891 24.3105 50.6864 25.1267C50.9837 25.9429 51.3945 26.6023 51.908 27.1104C52.4215 27.6185 53.0107 27.9752 53.6809 28.1915C54.3458 28.4077 55.0431 28.5158 55.7728 28.5158C56.8214 28.5158 57.6916 28.3158 58.3889 27.9104C58.9024 27.6131 59.3348 27.2834 59.697 26.9158C59.8483 26.7591 60.1078 26.8455 60.151 27.0564L60.3456 28.1212C60.3672 28.2509 60.4807 28.3428 60.6105 28.3428H62.7834C62.9347 28.3428 63.0536 28.2239 63.0536 28.0725V14.2243C63.0536 14.073 62.9347 13.954 62.7834 13.954H62.7942Z" fill="#191919"></path><path d="M73.644 25.6751H70.3846C69.8062 25.6751 69.3954 25.5562 69.163 25.3237C68.9306 25.0913 68.8117 24.6913 68.8117 24.1292V16.897C68.8117 16.7456 68.9306 16.6267 69.0819 16.6267H73.5034C73.6548 16.6267 73.7737 16.5078 73.7737 16.3564V14.2268C73.7737 14.0754 73.6548 13.9565 73.5034 13.9565H69.3522C69.0549 13.9565 68.8117 13.7133 68.8117 13.416V9.85394C68.8117 9.70259 68.6928 9.58368 68.5414 9.58368H66.0442C65.8928 9.58368 65.7739 9.70259 65.7739 9.85394V24.4427C65.7739 25.7562 66.082 26.7345 66.7036 27.3777C67.3198 28.0264 68.3144 28.3453 69.6819 28.3453H73.644C73.7953 28.3453 73.9142 28.2264 73.9142 28.075V25.9453C73.9142 25.794 73.7953 25.6751 73.644 25.6751Z" fill="#191919"></path><path d="M86.3392 14.5169C85.4852 14.0304 84.4907 13.7872 83.3447 13.7872C82.4475 13.7872 81.6205 13.9655 80.8691 14.3223C80.3286 14.5817 79.8475 14.9006 79.4367 15.2844C79.2638 15.4466 78.9881 15.3223 78.9881 15.0898V8.93866C78.9881 8.78731 78.8692 8.6684 78.7178 8.6684H76.1936C76.0423 8.6684 75.9233 8.78731 75.9233 8.93866V28.0732C75.9233 28.2246 76.0423 28.3435 76.1936 28.3435H78.7178C78.8692 28.3435 78.9881 28.2246 78.9881 28.0732V21.0626C78.9881 20.1275 79.1395 19.3167 79.4367 18.6303C79.734 17.9492 80.1611 17.4195 80.7178 17.0411C81.2691 16.6682 81.9232 16.479 82.6691 16.479C83.415 16.479 84.0096 16.6465 84.4961 16.9871C84.9825 17.3222 85.3501 17.7979 85.5933 18.4086C85.8366 19.0194 85.9609 19.7437 85.9609 20.587V28.0732C85.9609 28.2246 86.0798 28.3435 86.2311 28.3435H88.7284C88.8797 28.3435 88.9986 28.2246 88.9986 28.0732V20.3329C88.9986 18.8735 88.7716 17.6573 88.3122 16.6952C87.8527 15.7276 87.1987 15.0033 86.3446 14.5169H86.3392Z" fill="#191919"></path><path d="M104.469 12.9455C103.891 11.5239 103.064 10.4267 101.994 9.65913C100.923 8.89158 99.6423 8.50781 98.1451 8.50781C96.6478 8.50781 95.3884 8.89158 94.3073 9.65913C93.2317 10.4267 92.3993 11.5239 91.8209 12.9455C91.2426 14.3725 90.9507 16.0752 90.9507 18.0589V18.9561C90.9507 20.9615 91.2426 22.6804 91.8209 24.1128C92.3993 25.5451 93.2317 26.637 94.3073 27.3883C95.383 28.1397 96.664 28.5126 98.1451 28.5126C99.6261 28.5126 100.929 28.1397 101.994 27.3883C103.058 26.637 103.885 25.5451 104.469 24.1128C105.048 22.6804 105.339 20.9615 105.339 18.9561V18.0589C105.339 16.0752 105.048 14.3671 104.469 12.9455ZM94.0155 19.3021C94.0155 19.1507 94.0155 18.9994 94.0155 18.848V18.1724C94.0155 15.886 94.3722 14.1347 95.0857 12.9185C95.7992 11.7023 96.8208 11.0915 98.1505 11.0915C99.3883 11.0915 100.356 11.6158 101.058 12.6699C101.329 13.0482 101.096 13.5293 100.983 13.659L95.4424 19.8372C94.9506 20.3885 94.0425 20.048 94.0263 19.3129L94.0155 19.3021ZM102.275 18.848C102.275 21.1182 101.918 22.8587 101.204 24.0749C100.491 25.2911 99.4693 25.9019 98.1397 25.9019C96.9181 25.9019 95.9559 25.3884 95.2587 24.3614C94.9884 23.9884 95.2208 23.5128 95.3343 23.3776L100.853 17.1886C101.345 16.6373 102.253 16.9724 102.269 17.7129C102.269 17.8643 102.269 18.021 102.269 18.1778V18.8534L102.275 18.848Z" fill="#191919"></path><path d="M48.5034 25.7039H48.4277C48.125 25.7039 47.9142 25.6391 47.7791 25.5093C47.6493 25.3796 47.5845 25.1364 47.5845 24.7796V19.0176C47.5845 17.315 47.0602 16.0177 46.0115 15.1259C44.9629 14.234 43.4927 13.7908 41.6009 13.7908C40.4009 13.7908 39.3469 13.98 38.4388 14.3529C37.5307 14.7259 36.8064 15.2556 36.2605 15.9421C35.7794 16.5474 35.4767 17.2447 35.347 18.0339C35.32 18.196 35.4551 18.3474 35.6173 18.3474H38.0712C38.1956 18.3474 38.2983 18.2609 38.3307 18.1366C38.4766 17.5961 38.7955 17.1528 39.2982 16.8123C39.8604 16.4285 40.5793 16.2339 41.4603 16.2339C42.4333 16.2339 43.1954 16.461 43.7359 16.9204C44.2765 17.3799 44.5521 18.0123 44.5521 18.8176V19.4176C44.5521 19.569 44.4332 19.6879 44.2819 19.6879H41.0117C39.028 19.6879 37.5145 20.0879 36.4713 20.8825C35.4335 21.677 34.9092 22.8175 34.9092 24.2986C34.9092 25.1796 35.1362 25.9364 35.5848 26.5742C36.0335 27.212 36.6551 27.6931 37.455 28.0228C38.2496 28.3525 39.1631 28.5147 40.1955 28.5147C41.5468 28.5147 42.6441 28.2012 43.4981 27.5741C43.8711 27.2985 44.2062 26.985 44.4981 26.6444C44.6386 26.4769 44.9143 26.5363 44.9629 26.7471C45.0386 27.1039 45.1845 27.4174 45.3954 27.6714C45.7683 28.1201 46.4656 28.3471 47.4764 28.3471H48.779C48.9304 28.3471 49.0493 28.2282 49.0493 28.0768V26.1526C49.0493 25.785 48.9304 25.7039 48.5088 25.7039H48.5034ZM44.5467 22.5311C44.5467 23.2229 44.39 23.8499 44.0711 24.4013C43.7522 24.9526 43.3035 25.385 42.7198 25.6931C42.1414 26.0012 41.4333 26.158 40.6117 26.158C39.7901 26.158 39.1631 25.9634 38.6874 25.5796C38.2118 25.1958 37.9685 24.704 37.9685 24.104C37.9685 23.3743 38.2172 22.8283 38.7145 22.4716C39.2118 22.1148 39.9252 21.9365 40.8658 21.9365H44.5467V22.5256V22.5311Z" fill="#191919"></path></svg></a><div class="sc-dd041119-10 jBKEmn"><button aria-label="Menu" aria-expanded="false" class="sc-dd041119-11 bjnXGr"><span class="sc-dd041119-12 dImpXN"></span></button></div><section class="sc-48604b4d-0 jdEhsO"><ul class="sc-48604b4d-1 gWYFnN"><li class="sc-48604b4d-2 cQmDCV"><p class="sc-48604b4d-5 iFlflv">Developers</p><div class="sc-48604b4d-6 GBRPY"><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Developers</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="https://developer.auth0.com/" rel="external">Developer Center</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://developer.auth0.com/resources/code-samples" rel="external">Code Samples</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://developer.auth0.com/resources/guides" rel="external">Guides</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" rel="external">Identity Unlocked - Podcasts</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://developer.auth0.com/newsletter" rel="external">Zero Index Newsletter</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Developer Tools</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="https://openidconnect.net/" rel="external">OIDC Connect Playground</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://samltool.io/" rel="external">SAML Tool</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="http://jwt.io/" rel="external">JWT.io</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="http://webauthn.me/" rel="external">Webauthn.me</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Get Involved</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="https://developer.auth0.com/events" rel="external">Events</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/research-program" rel="external">Auth0 Research Program</a></li></ul></div></div></li><li class="sc-48604b4d-2 cQmDCV"><p class="sc-48604b4d-5 iFlflv">Documentation</p><div class="sc-48604b4d-6 GBRPY"><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Documentation</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/docs" rel="external">Auth0 Docs</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/docs/articles" rel="external">Articles</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/docs/quickstarts" rel="external">Quickstarts</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/docs/api" rel="external">APIs</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/docs/libraries" rel="external">SDK Libraries</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Support Center</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="https://community.auth0.com/" rel="external">Community</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://support.auth0.com/" rel="external">Support</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://community.auth0.com/c/help/6" rel="external">Help</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://community.auth0.com/c/faq/42" rel="external">FAQs</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://marketplace.auth0.com" rel="external">Explore Auth0 Marketplace</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/resources" rel="external">Resources</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/blog/" rel="external">Blog</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/learn" rel="external">Learn</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/intro-to-iam" rel="external">Intro to IAM (CIAM)</a></li></ul></div></div></li><li class="sc-48604b4d-2 cQmDCV"><p class="sc-48604b4d-5 iFlflv">Product</p><div class="sc-48604b4d-6 GBRPY"><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Platform</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/platform/access-management" rel="external">Access Management</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/platform/extensibility" rel="external">Extensibility</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/platform/login-security" rel="external">Security</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/platform/user-management" rel="external">User Management</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/platform/authentication" rel="external">Authentication</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/fine-grained-authorization" rel="external">Fine Grained Authorization</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://auth0.com/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 ePdqGw hgOYPl">View platform</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Features</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/features/universal-login" rel="external">Universal Login</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/single-sign-on" rel="external">Single Sign On</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/multifactor-authentication" rel="external">Multifactor Authentication</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/actions" rel="external">Actions</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/machine-to-machine" rel="external">Machine to Machine</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/passwordless" rel="external">Passwordless</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/features/breached-passwords" rel="external">Breached Passwords</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="https://auth0.com/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 ePdqGw hgOYPl">View features</a></li></ul></div></div></li><li class="sc-48604b4d-2 cQmDCV"><p class="sc-48604b4d-5 iFlflv">Solutions</p><div class="sc-48604b4d-6 GBRPY"><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Industries</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/nonprofits" rel="external">Nonprofits &amp; Charities</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/startups" rel="external">Startups</a></li></ul></div><div class="sc-48604b4d-7 kpcslJ"><p class="sc-48604b4d-8 iTmePz">Use Cases</p><ul class="sc-48604b4d-10 hERQyI"><li class="sc-48604b4d-11 jMXYKX"><a href="/b2c-customer-identity-management" rel="external">Consumer Applications</a></li><li class="sc-48604b4d-11 jMXYKX"><a href="/b2b-saas" rel="external">B2B SaaS Applications</a></li></ul></div></div></li><li class="sc-48604b4d-2 sc-48604b4d-3 cQmDCV bCysoQ"><a href="/blog/" rel="external" class="sc-48604b4d-4 gYmNyz">Blog</a></li><li class="sc-48604b4d-2 sc-48604b4d-3 cQmDCV bCysoQ"><a href="/pricing/" rel="external" class="sc-48604b4d-4 gYmNyz">Pricing</a></li><li class="sc-48604b4d-2 sc-48604b4d-3 cQmDCV bCysoQ"><div class="sc-48604b4d-13 gbXkOr"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><p class="sc-48604b4d-14 kJVMgi">Language</p></div><select class="sc-48604b4d-12 qpVDs"><option value="de">Deutsch</option><option value="en" selected="">English</option><option value="fr">Français</option><option value="es">Español</option><option value="pt">Português</option><option value="ja">日本語</option></select></li></ul><div class="sc-48604b4d-15 eFutmd"><div class="sc-48604b4d-18 bLoTPP"><a rel="external" href="/signup?place=header&amp;type=button&amp;text=sign%20up" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 ZxXlY jgibCU"><span>Sign up</span></a><a href="/api/auth/login?redirectTo=dashboard" rel="external" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cygfAN jgibCU"><span>Login</span></a></div><a href="/contact-us?place=header&amp;type=button&amp;text=contact%20sales" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 lpvcZN cydknG"><span>Contact sales</span></a></div></section></nav><nav aria-label="Desktop nav" class="sc-dd041119-6 hQZcnp"><div class="sc-dd041119-7 YCXld"><a rel="external" href="/" aria-label="Auth0 logo" class="sc-dd041119-4 qYilV"><svg xmlns="http://www.w3.org/2000/svg" width="106" height="40" viewBox="0 0 106 40" fill="none"><path d="M1.69096 17.4795C6.93608 16.6184 11.0487 12.5058 11.9098 7.26068L12.3326 4.70858C12.4108 4.21277 12.009 3.77959 11.5079 3.81612C7.51539 4.12404 3.75249 5.44967 1.67009 6.30037C0.662823 6.71268 0 7.69386 0 8.78985V16.8532C0 17.3282 0.422753 17.6883 0.892465 17.61L1.69096 17.4795Z" fill="#191919"></path><path d="M14.4356 7.26056C15.2968 12.5057 19.4094 16.6183 24.6545 17.4794L25.453 17.6099C25.9227 17.6882 26.3454 17.3281 26.3454 16.8531V8.78973C26.3454 7.69895 25.6826 6.71777 24.6753 6.30025C22.5982 5.44433 18.83 4.12392 14.8375 3.816C14.3365 3.77947 13.9294 4.21265 14.0129 4.70846L14.4356 7.26056Z" fill="#191919"></path><path d="M24.6589 20.0112C19.4138 20.8723 15.3012 24.9849 14.44 30.23L13.9181 35.209C13.8712 35.6578 14.367 35.9762 14.7428 35.7257C14.7428 35.7257 14.748 35.7257 14.7532 35.7205C18.0412 33.5024 25.5461 27.6936 26.2872 20.4392C26.3238 20.0843 26.0054 19.792 25.6557 19.8494L24.6641 20.0112H24.6589Z" fill="#191919"></path><path d="M11.9075 30.2277C11.0464 24.9826 6.9338 20.87 1.68868 20.0088L0.618783 19.8314C0.305641 19.7792 0.0238052 20.0401 0.0551193 20.3585C0.759688 27.6547 8.36904 33.5 11.6831 35.7181C12.0276 35.9477 12.4816 35.6711 12.4399 35.2588L11.9128 30.2225L11.9075 30.2277Z" fill="#191919"></path><path d="M62.7942 13.954H60.297C60.1456 13.954 60.0267 14.073 60.0267 14.2243V21.4295C60.0267 22.3105 59.8807 23.0835 59.5889 23.7483C59.297 24.4132 58.8862 24.9213 58.3511 25.2672C57.8159 25.6132 57.1835 25.7861 56.4538 25.7861C55.4052 25.7861 54.616 25.4402 54.0917 24.7483C53.5674 24.0564 53.3026 23.0619 53.3026 21.77V14.2243C53.3026 14.073 53.1837 13.954 53.0323 13.954H50.5081C50.3567 13.954 50.2378 14.073 50.2378 14.2243V22.0781C50.2378 23.2943 50.3891 24.3105 50.6864 25.1267C50.9837 25.9429 51.3945 26.6023 51.908 27.1104C52.4215 27.6185 53.0107 27.9752 53.6809 28.1915C54.3458 28.4077 55.0431 28.5158 55.7728 28.5158C56.8214 28.5158 57.6916 28.3158 58.3889 27.9104C58.9024 27.6131 59.3348 27.2834 59.697 26.9158C59.8483 26.7591 60.1078 26.8455 60.151 27.0564L60.3456 28.1212C60.3672 28.2509 60.4807 28.3428 60.6105 28.3428H62.7834C62.9347 28.3428 63.0536 28.2239 63.0536 28.0725V14.2243C63.0536 14.073 62.9347 13.954 62.7834 13.954H62.7942Z" fill="#191919"></path><path d="M73.644 25.6751H70.3846C69.8062 25.6751 69.3954 25.5562 69.163 25.3237C68.9306 25.0913 68.8117 24.6913 68.8117 24.1292V16.897C68.8117 16.7456 68.9306 16.6267 69.0819 16.6267H73.5034C73.6548 16.6267 73.7737 16.5078 73.7737 16.3564V14.2268C73.7737 14.0754 73.6548 13.9565 73.5034 13.9565H69.3522C69.0549 13.9565 68.8117 13.7133 68.8117 13.416V9.85394C68.8117 9.70259 68.6928 9.58368 68.5414 9.58368H66.0442C65.8928 9.58368 65.7739 9.70259 65.7739 9.85394V24.4427C65.7739 25.7562 66.082 26.7345 66.7036 27.3777C67.3198 28.0264 68.3144 28.3453 69.6819 28.3453H73.644C73.7953 28.3453 73.9142 28.2264 73.9142 28.075V25.9453C73.9142 25.794 73.7953 25.6751 73.644 25.6751Z" fill="#191919"></path><path d="M86.3392 14.5169C85.4852 14.0304 84.4907 13.7872 83.3447 13.7872C82.4475 13.7872 81.6205 13.9655 80.8691 14.3223C80.3286 14.5817 79.8475 14.9006 79.4367 15.2844C79.2638 15.4466 78.9881 15.3223 78.9881 15.0898V8.93866C78.9881 8.78731 78.8692 8.6684 78.7178 8.6684H76.1936C76.0423 8.6684 75.9233 8.78731 75.9233 8.93866V28.0732C75.9233 28.2246 76.0423 28.3435 76.1936 28.3435H78.7178C78.8692 28.3435 78.9881 28.2246 78.9881 28.0732V21.0626C78.9881 20.1275 79.1395 19.3167 79.4367 18.6303C79.734 17.9492 80.1611 17.4195 80.7178 17.0411C81.2691 16.6682 81.9232 16.479 82.6691 16.479C83.415 16.479 84.0096 16.6465 84.4961 16.9871C84.9825 17.3222 85.3501 17.7979 85.5933 18.4086C85.8366 19.0194 85.9609 19.7437 85.9609 20.587V28.0732C85.9609 28.2246 86.0798 28.3435 86.2311 28.3435H88.7284C88.8797 28.3435 88.9986 28.2246 88.9986 28.0732V20.3329C88.9986 18.8735 88.7716 17.6573 88.3122 16.6952C87.8527 15.7276 87.1987 15.0033 86.3446 14.5169H86.3392Z" fill="#191919"></path><path d="M104.469 12.9455C103.891 11.5239 103.064 10.4267 101.994 9.65913C100.923 8.89158 99.6423 8.50781 98.1451 8.50781C96.6478 8.50781 95.3884 8.89158 94.3073 9.65913C93.2317 10.4267 92.3993 11.5239 91.8209 12.9455C91.2426 14.3725 90.9507 16.0752 90.9507 18.0589V18.9561C90.9507 20.9615 91.2426 22.6804 91.8209 24.1128C92.3993 25.5451 93.2317 26.637 94.3073 27.3883C95.383 28.1397 96.664 28.5126 98.1451 28.5126C99.6261 28.5126 100.929 28.1397 101.994 27.3883C103.058 26.637 103.885 25.5451 104.469 24.1128C105.048 22.6804 105.339 20.9615 105.339 18.9561V18.0589C105.339 16.0752 105.048 14.3671 104.469 12.9455ZM94.0155 19.3021C94.0155 19.1507 94.0155 18.9994 94.0155 18.848V18.1724C94.0155 15.886 94.3722 14.1347 95.0857 12.9185C95.7992 11.7023 96.8208 11.0915 98.1505 11.0915C99.3883 11.0915 100.356 11.6158 101.058 12.6699C101.329 13.0482 101.096 13.5293 100.983 13.659L95.4424 19.8372C94.9506 20.3885 94.0425 20.048 94.0263 19.3129L94.0155 19.3021ZM102.275 18.848C102.275 21.1182 101.918 22.8587 101.204 24.0749C100.491 25.2911 99.4693 25.9019 98.1397 25.9019C96.9181 25.9019 95.9559 25.3884 95.2587 24.3614C94.9884 23.9884 95.2208 23.5128 95.3343 23.3776L100.853 17.1886C101.345 16.6373 102.253 16.9724 102.269 17.7129C102.269 17.8643 102.269 18.021 102.269 18.1778V18.8534L102.275 18.848Z" fill="#191919"></path><path d="M48.5034 25.7039H48.4277C48.125 25.7039 47.9142 25.6391 47.7791 25.5093C47.6493 25.3796 47.5845 25.1364 47.5845 24.7796V19.0176C47.5845 17.315 47.0602 16.0177 46.0115 15.1259C44.9629 14.234 43.4927 13.7908 41.6009 13.7908C40.4009 13.7908 39.3469 13.98 38.4388 14.3529C37.5307 14.7259 36.8064 15.2556 36.2605 15.9421C35.7794 16.5474 35.4767 17.2447 35.347 18.0339C35.32 18.196 35.4551 18.3474 35.6173 18.3474H38.0712C38.1956 18.3474 38.2983 18.2609 38.3307 18.1366C38.4766 17.5961 38.7955 17.1528 39.2982 16.8123C39.8604 16.4285 40.5793 16.2339 41.4603 16.2339C42.4333 16.2339 43.1954 16.461 43.7359 16.9204C44.2765 17.3799 44.5521 18.0123 44.5521 18.8176V19.4176C44.5521 19.569 44.4332 19.6879 44.2819 19.6879H41.0117C39.028 19.6879 37.5145 20.0879 36.4713 20.8825C35.4335 21.677 34.9092 22.8175 34.9092 24.2986C34.9092 25.1796 35.1362 25.9364 35.5848 26.5742C36.0335 27.212 36.6551 27.6931 37.455 28.0228C38.2496 28.3525 39.1631 28.5147 40.1955 28.5147C41.5468 28.5147 42.6441 28.2012 43.4981 27.5741C43.8711 27.2985 44.2062 26.985 44.4981 26.6444C44.6386 26.4769 44.9143 26.5363 44.9629 26.7471C45.0386 27.1039 45.1845 27.4174 45.3954 27.6714C45.7683 28.1201 46.4656 28.3471 47.4764 28.3471H48.779C48.9304 28.3471 49.0493 28.2282 49.0493 28.0768V26.1526C49.0493 25.785 48.9304 25.7039 48.5088 25.7039H48.5034ZM44.5467 22.5311C44.5467 23.2229 44.39 23.8499 44.0711 24.4013C43.7522 24.9526 43.3035 25.385 42.7198 25.6931C42.1414 26.0012 41.4333 26.158 40.6117 26.158C39.7901 26.158 39.1631 25.9634 38.6874 25.5796C38.2118 25.1958 37.9685 24.704 37.9685 24.104C37.9685 23.3743 38.2172 22.8283 38.7145 22.4716C39.2118 22.1148 39.9252 21.9365 40.8658 21.9365H44.5467V22.5256V22.5311Z" fill="#191919"></path></svg></a><ul role="menubar" class="sc-dd041119-13 gNXkEw"><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 dXokKX"><div class="sc-dd041119-15 gUdygj"><span>Developers</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 cSswwm"><section class="sc-dd041119-17 iWFzRI"><section class="sc-8f844919-0 sc-8f844919-1 kMedCs fYgQyZ"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Developers</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://developer.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Developer Center</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Code Samples</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://developer.auth0.com/resources/guides" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Guides</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Identity Unlocked - Podcasts</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Zero Index Newsletter</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 kMedCs KlUAi"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Developer Tools</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://openidconnect.net/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">OIDC Connect Playground</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://samltool.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">SAML Tool</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="http://jwt.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">JWT.io</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="http://webauthn.me/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Webauthn.me</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 kMedCs kwTHWS"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Get Involved</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Events</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Auth0 Research Program</a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 dXokKX"><div class="sc-dd041119-15 gUdygj"><span>Documentation</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 cSswwm"><section class="sc-dd041119-17 iWFzRI"><section class="sc-8f844919-0 sc-8f844919-1 kMedCs eEFInE"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Documentation</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/docs" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Auth0 Docs</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Articles</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Quickstarts</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">APIs</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">SDK Libraries</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 kMedCs gQSXyr"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Support Center</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Community</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Support</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Help</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">FAQs</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Explore Auth0 Marketplace</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Resources</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 kMedCs fSUhoO"><a href="/blog/getting-unlimited-scalability-with-okta-fine-grained-authorization/" rel="external" class="sc-1e1df8de-0 hpMGfJ"><div class="sc-1e1df8de-1 egMnOm"><img loading="lazy" src="https://cdn.auth0.com/website/website/cic-header/hero/blog-thumbnail.png" alt="" class="sc-1e1df8de-3 dekmZq"/><div><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ jRUMqL">BLOG</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 bRQyBu bZBVNy">Getting Unlimited Scalability with Okta Fine Grained Authorization</p></div></div></a><div class="sc-4b4277c0-0 cdzIQC"></div><div class="sc-4b4277c0-1 fhOriK"><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Blog</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Learn</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Intro to IAM (CIAM)</a></li></ul></div></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 dXokKX"><div class="sc-dd041119-15 gUdygj"><span>Product</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 cSswwm"><section class="sc-dd041119-17 iWFzRI"><section class="sc-8f844919-0 sc-8f844919-1 kMedCs fYgQyZ"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Platform</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Access Management</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Extensibility</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Security</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">User Management</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Authentication</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/fine-grained-authorization" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Fine Grained Authorization</a></li></ul><div class="sc-c4163730-4 bmElMS"><a href="https://auth0.com/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cjrfSg cZWjgL">View platform</a></div></section><section class="sc-8f844919-0 sc-8f844919-2 kMedCs KlUAi"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Features</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Universal Login</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Single Sign On</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Multifactor Authentication</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Actions</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Machine to Machine</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Passwordless</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/features/breached-passwords" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Breached Passwords</a></li></ul><div class="sc-c4163730-4 bmElMS"><a href="https://auth0.com/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cjrfSg cZWjgL">View features</a></div></section><section class="sc-8f844919-0 sc-8f844919-3 kMedCs dgugYr"><ul class="sc-31a2510-0 hClFVD"><li class="sc-31a2510-1 kgkoMp"><a rel="external" href="/resources/videos/platform-introduction-video-2020" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 dlwkNS jKVeGi"><div><p>Technology Overview</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 cOQfMy dcXmxo">Watch a walkthrough of the Auth0 Platform</p></div></a></li><li class="sc-31a2510-1 kgkoMp"><a rel="external" href="/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 dlwkNS jKVeGi"><div><p>Cloud Deployments</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 cOQfMy dcXmxo">Deploy to the cloud, your way</p></div></a></li><li class="sc-31a2510-1 kgkoMp"><a rel="external" href="/marketplace" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 dlwkNS jKVeGi"><div><p>Auth0 Marketplace</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 cOQfMy dcXmxo">Discover the integrations you need to solve identity</p></div></a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 dXokKX"><div class="sc-dd041119-15 gUdygj"><span>Solutions</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 cSswwm"><section class="sc-dd041119-17 iWFzRI"><section class="sc-8f844919-0 sc-8f844919-1 kMedCs eEFInE"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Industries</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/nonprofits" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Nonprofits &amp; Charities</a></li><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/startups" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">Startups</a></li></ul><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ cFnjuQ">Your goals</p><ul role="menubar" class="sc-c4163730-1 dLYyDO"><li role="menuitem" class="sc-c4163730-2 fIsAbH"><a rel="external" href="/secure-smarter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq gdLUMv">&lt;/secure smarter&gt;</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 kMedCs gQSXyr"><div class="sc-8583e179-0 IXeEz"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ fZlkRU">Use Cases</p><a rel="external" href="/b2c-customer-identity-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq ctSvSw"><span>Consumer Applications</span></a><a rel="external" href="/b2b-saas" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq ctSvSw"><span>B2B SaaS Applications</span></a><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ fZlkRU">Case Studies</p><a rel="external" href="/customers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fyVFIq ctSvSw"><span>Read our customers stories</span></a></div></section><section class="sc-8f844919-0 sc-8f844919-3 kMedCs fSUhoO"><a href="https://okta.valuestoryapp.com/okta/?utm_Origin=Auth0" rel="external" class="sc-1e1df8de-0 hpMGfJ"><div class="sc-1e1df8de-1 egMnOm"><img loading="lazy" src="https://cdn.auth0.com/website/header/ROI_thumb_2x.png" alt="" class="sc-1e1df8de-3 dekmZq"/><div><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 cruTcJ jRUMqL">CIAM ROI Calculator</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 bRQyBu bZBVNy">Estimate the revenue impact to your customer-facing business</p></div></div></a></section></section></div></li><li role="menuitem" aria-haspopup="false" tabindex="0" class="sc-dd041119-16 dXokKX"><a href="/blog/" rel="external" class="sc-dd041119-15 gUdygj"><span>Blog</span></a></li><li role="menuitem" aria-haspopup="false" class="sc-dd041119-16 dXokKX"><a href="/pricing/" rel="external" class="sc-dd041119-15 gUdygj"><span>Pricing</span></a></li></ul><div class="sc-dd041119-8 ixaIYF"><a role="button" rel="external" href="/signup?place=header&amp;type=button&amp;text=sign%20up" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 ZxXlY jWvUNs"><span>Sign up</span></a><a role="button" rel="external" href="/contact-us?place=header&amp;type=button&amp;text=contact%20sales" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cygfAN cEqvqp"><span>Contact sales</span></a></div></div></nav></header><main><section class="sc-527f19d-0 dCmHBC"><div class="sc-527f19d-1 dJqrul"><h1 class="styled__Heading-sc-165cfko-2 utils-sc-11hlfw-0 eLwCGt dpUTiS">Resources</h1><div class="sc-527f19d-5 JDGQW"><div class="sc-527f19d-6 fhWpyk"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="sc-527f19d-7 eQbjVs"><path d="M11 19a8 8 0 100-16 8 8 0 000 16zM21 21l-4.35-4.35" stroke="#606060" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path></svg><input type="text" placeholder="Search" class="sc-527f19d-8 bTzeuX" value=""/></div><div class="sc-527f19d-9 ebfmSm"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path d="M12 22c5.523 0 10-4.477 10-10S17.523 2 12 2 2 6.477 2 12s4.477 10 10 10zM2 12h20" stroke="#42464D"></path><path d="M12 2a15.3 15.3 0 014 10 15.3 15.3 0 01-4 10 15.3 15.3 0 01-4-10 15.3 15.3 0 014-10v0z" stroke="#42464D"></path></svg><select class="sc-527f19d-10 jjoxhi"><option value="" disabled="">Language</option><option value="EN" selected="">English</option><option value="DE">Deutsch</option><option value="ES">Español</option><option value="FR">Français</option><option value="JP">日本語</option><option value="PT">Português</option></select></div></div></div><div class="sc-527f19d-4 jTmfPd"><ul class="sc-527f19d-17 LeCub"><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources">All</a></li><li class="sc-527f19d-18 gIOkMI"><a aria-label="link to resource " href="/resources/ebooks">Ebooks</a></li><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources/webinars">Webinars</a></li><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources/videos">Videos</a></li><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources/whitepapers">Whitepapers</a></li><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources/podcasts">Podcasts</a></li><li class="sc-527f19d-18 kpYltW"><a aria-label="link to resource " href="/resources/upcoming-webinars">Upcoming Webinars</a></li></ul></div><div class="sc-527f19d-3 hKxkNd"><a aria-label="link to OAuth2.0 and OpenID Connect: The Professional Guide" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/oauth-openid-connect-professional-guide"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1Nqkz9rhHoQmP1meMumyJE/79c05d6ca8bec0d446a2b767c2849574/Cover-image.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1Nqkz9rhHoQmP1meMumyJE/79c05d6ca8bec0d446a2b767c2849574/Cover-image.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1Nqkz9rhHoQmP1meMumyJE/79c05d6ca8bec0d446a2b767c2849574/Cover-image.png?w=560" aria-hidden="false" alt="OAuth2.0 and OpenID Connect: The Professional Guide" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">OAuth2.0 and OpenID Connect: The Professional Guide</h2></a><a aria-label="link to Accelerate Innovation through Identity Management" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/accelerate-innovation-through-identity-management-infographic"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png?w=560" aria-hidden="false" alt="Accelerate Innovation through Identity Management" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Accelerate Innovation through Identity Management</h2></a><a aria-label="link to Make your UX dance with CIAM" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/improving-user-experiences-with-ciam"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png?w=560" aria-hidden="false" alt="Make your UX dance with CIAM" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Make your UX dance with CIAM</h2></a><a aria-label="link to Build and scale your product faster" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/build-and-scale-market-leading-products-faster"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png?w=560" aria-hidden="false" alt="Build and scale your product faster" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Build and scale your product faster</h2></a><a aria-label="link to Why Auth0?" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/why-auth0-by-okta"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png?w=560" aria-hidden="false" alt="Why Auth0?" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Why Auth0?</h2></a><a aria-label="link to Infographic: Identity Security: The big Security Dimension" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/identity-security-the-big-security-dimension-infographic"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png?w=560" aria-hidden="false" alt="Infographic: Identity Security: The big Security Dimension" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Infographic: Identity Security: The big Security Dimension</h2></a><a aria-label="link to SAML Authentication, Explained" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/saml-authentication-explained"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png?w=560" aria-hidden="false" alt="SAML Authentication, Explained" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">SAML Authentication, Explained</h2></a><a aria-label="link to JWT Handbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/jwt-handbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png?w=560" aria-hidden="false" alt="JWT Handbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">JWT Handbook</h2></a><a aria-label="link to The Passkeys Handbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/the-passkeys-handbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png?w=560" aria-hidden="false" alt="The Passkeys Handbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">The Passkeys Handbook</h2></a><a aria-label="link to .NET Identity with Auth0" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/net-identity-with-auth0"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg?w=560" aria-hidden="false" alt=".NET Identity with Auth0" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">.NET Identity with Auth0</h2></a><a aria-label="link to The Ultimate Guide to Content Security Policy (CSP)" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/the-ultimate-guide-to-csp"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/6GnjSym6UsMQ4ee46mQDzl/0eddfdb915b5dbcc2b7fbb15a52726ab/Screenshot_2023-10-30_at_16.37.14.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/6GnjSym6UsMQ4ee46mQDzl/0eddfdb915b5dbcc2b7fbb15a52726ab/Screenshot_2023-10-30_at_16.37.14.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/6GnjSym6UsMQ4ee46mQDzl/0eddfdb915b5dbcc2b7fbb15a52726ab/Screenshot_2023-10-30_at_16.37.14.png?w=560" aria-hidden="false" alt="The Ultimate Guide to Content Security Policy (CSP)" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">The Ultimate Guide to Content Security Policy (CSP)</h2></a><a aria-label="link to Implementing MFA in React Using Auth0 and AWS Amplify" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/implementing-mfa-in-react-using-auth0-aws"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/f5Nvn50DZqeLonsg75SnG/17ad9470af8a451e01fa1a1c858de3f9/Auth0_AWS_Amplify_eBook_Cover.jpg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/f5Nvn50DZqeLonsg75SnG/17ad9470af8a451e01fa1a1c858de3f9/Auth0_AWS_Amplify_eBook_Cover.jpg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/f5Nvn50DZqeLonsg75SnG/17ad9470af8a451e01fa1a1c858de3f9/Auth0_AWS_Amplify_eBook_Cover.jpg?w=560" aria-hidden="false" alt="Implementing MFA in React Using Auth0 and AWS Amplify" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Implementing MFA in React Using Auth0 and AWS Amplify</h2></a><a aria-label="link to Angular Handbook: Identity and State Management" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/angular-handbook-identity-and-state-management"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2MI8l4l0Cka4q3IAQebIhi/8d1dca0bd696978227ed39ea363be8e1/AngularHandbook-cover.jpg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2MI8l4l0Cka4q3IAQebIhi/8d1dca0bd696978227ed39ea363be8e1/AngularHandbook-cover.jpg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2MI8l4l0Cka4q3IAQebIhi/8d1dca0bd696978227ed39ea363be8e1/AngularHandbook-cover.jpg?w=560" aria-hidden="false" alt="Angular Handbook: Identity and State Management" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Angular Handbook: Identity and State Management</h2></a><a aria-label="link to Secured and Assured Unit 4 Workbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/secured-and-assured-unit-4-workbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg?w=560" aria-hidden="false" alt="Secured and Assured Unit 4 Workbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Secured and Assured Unit 4 Workbook</h2></a><a aria-label="link to Secured and Assured Unit 3 Workbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/secured-and-assured-unit-3-workbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg?w=560" aria-hidden="false" alt="Secured and Assured Unit 3 Workbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Secured and Assured Unit 3 Workbook</h2></a><a aria-label="link to Secured and Assured Unit 2 Workbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/secured-and-assured-unit-2-workbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg?w=560" aria-hidden="false" alt="Secured and Assured Unit 2 Workbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Secured and Assured Unit 2 Workbook</h2></a><a aria-label="link to Secured and Assured Unit 1 Workbook" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/secured-and-assured-unit-1-workbook"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg?w=560" aria-hidden="false" alt="Secured and Assured Unit 1 Workbook" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Secured and Assured Unit 1 Workbook</h2></a><a aria-label="link to Enterprise-Ready Identity" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/enterprise-ready-identity"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/2enIs6tamYOMGhgSrZFZWZ/8a88fb944f787f60065142d327b173e8/Enterprise-Ready_Identity_Guide_-_Thumbnail.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/2enIs6tamYOMGhgSrZFZWZ/8a88fb944f787f60065142d327b173e8/Enterprise-Ready_Identity_Guide_-_Thumbnail.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/2enIs6tamYOMGhgSrZFZWZ/8a88fb944f787f60065142d327b173e8/Enterprise-Ready_Identity_Guide_-_Thumbnail.png?w=560" aria-hidden="false" alt="Enterprise-Ready Identity" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Enterprise-Ready Identity</h2></a><a aria-label="link to The Log Inn #NoDistractions" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/log-inn-no-distractions"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/3mSawbeWF4CqKcNxg5q4DK/1b9d563fe91d7a826a206f3465bd027e/nodistractionsthumbnail.png?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/3mSawbeWF4CqKcNxg5q4DK/1b9d563fe91d7a826a206f3465bd027e/nodistractionsthumbnail.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/3mSawbeWF4CqKcNxg5q4DK/1b9d563fe91d7a826a206f3465bd027e/nodistractionsthumbnail.png?w=560" aria-hidden="false" alt="The Log Inn #NoDistractions" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">The Log Inn #NoDistractions</h2></a><a aria-label="link to Public Sector Infographic: Secure, Frictionless CIAM in the UK" class="sc-527f19d-12 bBBbBc" href="/resources/ebooks/uk-public-sector-ciam-infographic"><div class="sc-527f19d-13 kfUZFg"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/460ILZCPJCyHAIQa63IK4w/3dc52ea9938df4b770662a8874558c52/Whitepaper_Cover_A4__8_.jpeg?w=560&amp;fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/460ILZCPJCyHAIQa63IK4w/3dc52ea9938df4b770662a8874558c52/Whitepaper_Cover_A4__8_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/460ILZCPJCyHAIQa63IK4w/3dc52ea9938df4b770662a8874558c52/Whitepaper_Cover_A4__8_.jpeg?w=560" aria-hidden="false" alt="Public Sector Infographic: Secure, Frictionless CIAM in the UK" class="sc-527f19d-11 zdKOy"/></picture></div><p class="sc-527f19d-15 cvgIOz">Ebooks</p><h2 class="sc-527f19d-14 iZIrXB">Public Sector Infographic: Secure, Frictionless CIAM in the UK</h2></a></div><nav aria-label="pagination" class="sc-59b87673-0 gBAyLy"><ul class="sc-59b87673-1 dcytot"><li aria-current="true" aria-label="Page 1" class="sc-59b87673-2 kVpoAe">1</li><li aria-current="false" aria-label="Page 2" class="sc-59b87673-2 joqeqJ">2</li><li aria-current="false" aria-label="Page 3" class="sc-59b87673-2 joqeqJ">3</li><li href="/resources/ebooks/page2" class="sc-59b87673-2 joqeqJ"><svg width="13" height="11" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M1 10l4.5-4.5L1 1M7 10l4.5-4.5L7 1" stroke="#000" stroke-width="2"></path></svg></li></ul></nav></section><section class="sc-3e4086c7-0 fEZVQw"><div class="sc-3e4086c7-1 iltjHZ"><h3 class="sc-3e4086c7-2 SBvAU"><span><p>Secure access for everyone.<br /> But not just anyone.</p> </span></h3><div class="sc-3e4086c7-3 huPKqg"><button class="sc-3e4086c7-4 cSKiaU">Try Auth0 for free</button><button class="sc-3e4086c7-4 kEPccb">Talk to sales</button></div></div></section></main><div class="sc-da5983f0-0 gwYtlx"><footer class="sc-da5983f0-1 kwotlH"><nav class="sc-da5983f0-2 wzIcC"><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Developers</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="https://developer.auth0.com/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Developer Hub<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Code Samples and Guides<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/blog/developers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Blog posts<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Identity Unlocked - Podcasts<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Zero Index Newsletter<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Documentation</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Articles<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Quickstarts<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">APIs<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">SDK Libraries<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://auth0.com/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Blog<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://auth0.com/resources/ebooks" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Reports<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://auth0.com/resources/webinars" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Webinars<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Support Center</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Community<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Support<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Help<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">FAQs<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Auth0 Marketplace<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Company</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="/customers" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Our Customers<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Compliance - Ensuring privacy and security<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/partners" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Partners<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://www.okta.com/company/careers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Careers<!-- --> <span class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 mSpid kHaByn">We&#x27;re hiring!</span></a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://www.okta.com/company/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">About us<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Get Involved</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Events<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Auth0 Research Program<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Learning</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Learn<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Intro to IAM (CIAM)<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="https://auth0.com/blog/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Blog<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Platform</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Access Management<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Extensibility<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Security<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">User Management<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Authentication<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Cloud deployments<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/fine-grained-authorization" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Fine Grained Authorization<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 gahICZ kfRWXJ">Features</p><ul class="sc-da5983f0-3 bLUmS"><li class="sc-da5983f0-5 dVkxMv"><a href="/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Universal Login<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Single Sign On<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Multifactor Authentication<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Actions<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Machine to Machine<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Passwordless<!-- --> </a></li><li class="sc-da5983f0-5 dVkxMv"><a href="/features/breached-passwords" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d KYCXS">Breached Passwords<!-- --> </a></li></ul></section><section class="sc-da5983f0-6 cdKcsR"><div class="sc-da5983f0-7 youMP"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 eqlDTL"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 eqlDTL"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 eqlDTL"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div></section></nav><section class="sc-da5983f0-10 jqMtSJ"><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 cOQfMy jxtigD">© <!-- -->2025<!-- --> Okta, Inc. All Rights Reserved.</p><div class="sc-da5983f0-12 fZZTui"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 fYjwsD"><span class="sc-da5983f0-17 fpYidZ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iWRmar">English</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 cxcZqY"><ul class="sc-da5983f0-15 iYKLJh"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 chqEKw">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 chqEKw">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 chqEKw">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 chqEKw">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 chqEKw">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 chqEKw">日本語</li></ul></div></span></span></section><section class="sc-da5983f0-9 hyvxTC"><div class="sc-da5983f0-7 lRjLk"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 eqlDTL"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 eqlDTL"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 eqlDTL"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div><div class="sc-da5983f0-11 esTuHb"><div class="sc-da5983f0-12 fZZTui"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 iRpAA-d kHaByn">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 fYjwsD"><span class="sc-da5983f0-17 fpYidZ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iWRmar">English</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 cxcZqY"><ul class="sc-da5983f0-15 iYKLJh"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 chqEKw">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 chqEKw">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 chqEKw">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 chqEKw">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 chqEKw">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 chqEKw">日本語</li></ul></div></span></span></div><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 cOQfMy cCNUxe">© <!-- -->2025<!-- --> Okta, Inc. All Rights Reserved.</p></section></footer></div><div id="asset-library-root"></div><iframe id="drift-iframe" src="https://drift.app.auth0.com/drift-iframe" title="Drift iframe" style="width:0;height:0;border:none;position:absolute"></iframe><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-W7FRLJ" height="0" width="0" style="display:none;visibility:hidden" title="gtm"></iframe></noscript></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":[{"type":"ebooks","updatedAt":"2025-04-04T16:34:39.451Z","title":"OAuth2.0 and OpenID Connect: The Professional Guide","id":"oauth-openid-connect-professional-guide","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Nqkz9rhHoQmP1meMumyJE","type":"Asset","createdAt":"2020-03-12T15:03:14.252Z","updatedAt":"2020-03-16T16:47:57.191Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":2,"locale":"en-US"},"fields":{"title":"cover-oauth-and-openid","description":"Cover for the OAuth2 and OpenID Connect ebook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Nqkz9rhHoQmP1meMumyJE/79c05d6ca8bec0d446a2b767c2849574/Cover-image.png","details":{"size":791753,"image":{"width":600,"height":856}},"fileName":"Cover-image.png","contentType":"image/png"}}},"description":"Authentication and authorization are critical parts of any application. They evolved over the years to meet the challenging requirements of the modern Web. OAuth2.0 and OpenID Connect offer a framework for handling them in an effective way. Learn the best practices in using both standards in different scenarios and application types. This e-book will explain not just the hows, but also the whys of OAuth2.0 and OpenID Connect.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2gWZu2lfbC9mf95aUT73UX","type":"Asset","createdAt":"2020-03-12T15:05:17.230Z","updatedAt":"2024-04-05T13:04:18.501Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":2,"locale":"en-US"},"fields":{"title":"TwitterCard OAuth2-and-OpenID-Connect Ebook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2gWZu2lfbC9mf95aUT73UX/e9bb799d9da3a842fdd74d5512f664ca/TwitterCard_Auth-and-OpenID-Connect_01__1_.png","details":{"size":827474,"image":{"width":2400,"height":1260}},"fileName":"TwitterCard_Auth-and-OpenID-Connect_01 (1).png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"0.2","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7D1vaJ4Q908Th0iklEkFWs","type":"Asset","createdAt":"2025-03-20T11:12:08.920Z","updatedAt":"2025-03-20T11:12:08.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth 2.0 and OpenID Connect_ The Professional Guide_Feb6","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7D1vaJ4Q908Th0iklEkFWs/d4a6ebeb2814000214da88a224c9b2f4/OAuth_2.0_and_OpenID_Connect__The_Professional_Guide_Feb6.pdf","details":{"size":5458208},"fileName":"OAuth 2.0 and OpenID Connect_ The Professional Guide_Feb6.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7A99N5rKD7MaCuPD5egc6W","type":"Entry","createdAt":"2019-11-07T21:24:45.050Z","updatedAt":"2020-03-17T05:08:25.703Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Vittorio Bertocci","job_title":"Principal Architect","twitter":"https://twitter.com/vibronet","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6Uq3rAEqVEM5juOM1k4x05","type":"Asset","createdAt":"2019-11-07T21:23:31.010Z","updatedAt":"2019-11-07T21:23:31.010Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":1,"locale":"en-US"},"fields":{"title":"Vittorio Bertocci","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6Uq3rAEqVEM5juOM1k4x05/091f9532d6afc05189cce8f852ed4d1d/Vittorio.jpeg","details":{"size":24931,"image":{"width":512,"height":512}},"fileName":"Vittorio.jpeg","contentType":"image/jpeg"}}}}},"content":"1. Preface `4`\n2. Introduction `5`\n3. Chapter 1 - Introduction to Digital Identity `6`\n4. From User Passwords in Every App... `9`\n5. ...to Directories `11`\n6. Cross-Domain SSO `13`\n7. The Password Sharing Anti-Pattern `18`\n8. Delegated Authorization: OAuth 2.0 `20`\n9. Layering Sign In on Top of OAuth 2.0: OpenID Connect `24`\n10. Auth0: an Intermediary Keeping Complexity at Bay `28`\n11. Chapter 2 - OAuth 2.0 and OpenID Connect `30`\n12. OAuth 2.0 Roles `32`\n13. OAuth 2.0 Grants and OIDC Flows `34`\n14. Chapter 3 - Web Sign-In `35`\n15. Confidential Clients `35`\n16. The Implicit Grant with Form Post `37`\n17. A detailed walkthrough `37`\n18. Anatomy of an ID Token `44`\n19. Principles of Token Validation `47`\n20. Metadata and Discovery `50`\n21. Chapter 4 - Calling an API from a Web App `53`\n22. The Authorization Code Grant `53`\n23. Sidebar: Essential Authorization Concepts and Terminology `64`\n24. The Refresh Token Grant `68`\n25. Sidebar: Access Tokens vs. ID Tokens `75`\n26. ID Tokens and the Back Channel `79`\n27. The Userinfo Endpoint `80`\n28. The Hybrid Grant `85`\n29. Client Credentials Grant `85`\n30. Chapter 5 - Desktop and Mobile Apps `92`\n31. Public Clients `92`\n32. Native Applications and the Browser `93`\n33. Meet the PKCE `95`\n34. Desktop Applications and Browsers `95`\n35. The Authorization Code Grant with PKCE `96`\n36. The Problem with Refresh Tokens `101`\n37. The Resource Owner Grant `103`\n38. Other Grants for Native Apps `108`\n39. Chapter 6 - Single Page Applications `110`\n40. The Nature of Single Page Applications `110`\n41. Security Challenges of Single Page Applications `110`\n42. Single Page Applications and the Implicit Grant `111`\n43. SPAs and the Authorization Code with PKCE Flow `113`\n44. SPAs with a Backend `115`\n45. Conclusion `119`","release_details":["Added chapter 4"],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"I68vnBTDrtWvRqwLKRZ6A","type":"Entry","createdAt":"2020-08-04T22:10:09.945Z","updatedAt":"2025-04-04T16:33:21.732Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"0.2"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7kKOfWfCFvLsU366lKTLO2","type":"Asset","createdAt":"2020-09-29T20:54:22.501Z","updatedAt":"2020-09-29T20:54:22.501Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 and OpenID Connect","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7kKOfWfCFvLsU366lKTLO2/330b3420118541ce8c45142ba6e54a77/resource_thumb_51.jpg","details":{"size":123947,"image":{"width":581,"height":388}},"fileName":"resource_thumb_51.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"12HfySZf7MFDll37Nc88p4","type":"Asset","createdAt":"2020-03-12T15:12:45.253Z","updatedAt":"2020-03-12T15:12:45.253Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2-and-OpenID-Connect-The-Professional-Guide notification image","description":"OAuth2-and-OpenID-Connect-The-Professional-Guide PDF","file":{"url":"//images.ctfassets.net/2ntc334xpx65/12HfySZf7MFDll37Nc88p4/1c13360ac8da95568cd24b9ec94d6e5c/notification-02__1_.png","details":{"size":151994,"image":{"width":600,"height":600}},"fileName":"notification-02 (1).png","contentType":"image/png"}}},"ocid":"7014z000001cb7UAAQ-aPA4z000000015SGAQ"},{"type":"ebooks","updatedAt":"2025-02-25T18:19:08.432Z","title":"Accelerate Innovation through Identity Management","id":"accelerate-innovation-through-identity-management-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1rieO7ZYFtv2KsICGyOlQu","type":"Asset","createdAt":"2025-02-11T12:48:57.545Z","updatedAt":"2025-02-13T12:41:56.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"Thumbnail How to Accelerate Innovation","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1rieO7ZYFtv2KsICGyOlQu/7380f0a256488e1c47c2ed27945086a5/Thumbnail___How_to_Accelerate_Innovation.png","details":{"size":311076,"image":{"width":600,"height":681}},"fileName":"Thumbnail___How_to_Accelerate_Innovation.png","contentType":"image/png"}}},"description":"Modernizing your Customer Identity and Access Management (CIAM) is a complex challenge that demands extensive resources and expertise. But it's also a distraction from your core mission – creating value for customers through innovative products and features.\n\nThis infographic shows you how to free up your team to focus on innovation by partnering with Identity management experts at Auth0 by Okta. You'll learn:\n\nThe 4 essential components of a robust CIAM solution - and why getting them right is so difficult. There are myriad regulations you must comply with for customer data privacy and security. How identity is the new security perimeter, under constant attack from sophisticated cyber threats. How Auth0’s security-first, developer-friendly platform can offload the CIAM burden so you can scale your business.\n\nStop getting bogged down in identity management details. Discover how to accelerate innovation by leveraging a trusted CIAM partner.\n\nDownload the infographic now.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4A3ogvksp0ZvlvywLvI2oZ","type":"Asset","createdAt":"2025-02-11T12:50:37.280Z","updatedAt":"2025-02-11T12:50:37.280Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Sharecard How to accelerate innovation through Identity management - 1200x628","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4A3ogvksp0ZvlvywLvI2oZ/a931d002c9ca064dd4047055b813a96a/Sharecard___How_to_accelerate_innovation_through_Identity_management_-_1200x628.png","details":{"size":677981,"image":{"width":1200,"height":628}},"fileName":"Sharecard _ How to accelerate innovation through Identity management - 1200x628.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6Ioz9RcTUNf5hmPDpZuqxF","type":"Asset","createdAt":"2025-02-25T18:19:04.138Z","updatedAt":"2025-02-25T18:19:04.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"207251-V3a-OKT-Auth0-technical-infographic Auth0 Final 20250212","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6Ioz9RcTUNf5hmPDpZuqxF/925440fc83c2c9284813796077609c31/207251-V3a-OKT-Auth0-technical-infographic_Auth0_Final_20250212.pdf","details":{"size":2694237},"fileName":"207251-V3a-OKT-Auth0-technical-infographic_Auth0_Final_20250212.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"__ __","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"QuYPVgX7D5KCjpf5q3HxW","type":"Entry","createdAt":"2024-12-05T20:00:08.514Z","updatedAt":"2024-12-05T20:00:08.514Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001YqoFAAS-aPA4z000000k9siGAA"},{"type":"ebooks","updatedAt":"2025-02-13T12:57:52.838Z","title":"Make your UX dance with CIAM","id":"improving-user-experiences-with-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6gFTmCtoggWJnOWML2km5Y","type":"Asset","createdAt":"2025-02-11T14:33:25.406Z","updatedAt":"2025-02-13T12:57:48.545Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Thumbnail Improving User Experiences with CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6gFTmCtoggWJnOWML2km5Y/1c9f1709c4420fd9b8cccddb50d86f0f/Thumbnail___Improving_User_Experiences_with_CIAM.png","details":{"size":155325,"image":{"width":600,"height":688}},"fileName":"Thumbnail___Improving_User_Experiences_with_CIAM.png","contentType":"image/png"}}},"description":"Every little advantage is a big advantage for winning and retaining customers.\n\nThis resource will show you how you can effectively manage customer identities. Download now to find out:\n\nHow CIAM can help you implement progressive profiling and take advantage of zero-party data (ZPD)\nWays in which you can seamlessly secure your customers’ data with bot mitigation, MFA, and breached password detection\nHow you can make account creation and subsequent logins as smooth and enjoyable as possible for customers","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3cI791bAwLMOdNSIRjwmcb","type":"Asset","createdAt":"2025-02-11T14:34:08.570Z","updatedAt":"2025-02-11T14:34:08.570Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Sharecard Improving user experiences with CIAM - 1200x628","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3cI791bAwLMOdNSIRjwmcb/ed79ca25e7a9ad90d9eec9c9d5f0931d/Sharecard___Improving_user_experiences_with_CIAM_-_1200x628.png","details":{"size":525816,"image":{"width":1200,"height":628}},"fileName":"Sharecard _ Improving user experiences with CIAM - 1200x628.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5WF8kHMelD59wtG0UyLGDd","type":"Asset","createdAt":"2025-02-11T14:32:19.395Z","updatedAt":"2025-02-11T14:32:19.395Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"PDF Improving User Experiences with CIAM","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5WF8kHMelD59wtG0UyLGDd/34fb69437212b9185f4f941a4e06a689/PDF___Improving_User_Experiences_with_CIAM.pdf","details":{"size":9000240},"fileName":"PDF _ Improving User Experiences with CIAM.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3r7EWGt1iX1QqqqfTrAtth","type":"Entry","createdAt":"2021-01-29T21:08:42.991Z","updatedAt":"2021-05-10T21:18:14.367Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"2 Introduction\n3 What is CIAM?\n4 Why CIAM matters\n4 Auth0’s unique approach to CIAM\n5 Seamless sign-up and login\n8 Enhancing personalization with CIAM data\n11 Security meets experience: How CIAM enhances both\n12 CIAM empowers developers to integrate GenAI into user experiences\n13 Conclusion","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2aznT5wUzOa9fuyPEVETRH","type":"Entry","createdAt":"2025-02-11T14:23:10.201Z","updatedAt":"2025-02-11T14:23:10.201Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001YyUeAAK-aPA4z000000k9rOGAQ"},{"type":"ebooks","updatedAt":"2025-02-13T12:55:22.892Z","title":"Build and scale your product faster","id":"build-and-scale-market-leading-products-faster","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ibtZHIHLm5dohK1GfSzyg","type":"Asset","createdAt":"2025-02-11T14:26:23.490Z","updatedAt":"2025-02-13T12:50:59.488Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"locale":"en-US"},"fields":{"title":"Thumbnail Accelerating Success","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ibtZHIHLm5dohK1GfSzyg/e60db3253e27a02dc793d347bbe6029c/Thumbnail___Accelerating_Success.png","details":{"size":111318,"image":{"width":600,"height":682}},"fileName":"Thumbnail___Accelerating_Success.png","contentType":"image/png"}}},"description":"Sadly, there’s no time to take your time these days. By the time you’ve tweaked your wonderful new UX, someone else has snuck in and stolen your potential customers.\n\nThis article will show how a CIAM platform can help you stay one step ahead:\n\nClear, actionable strategies to help you build and scale your products faster\nTips on how to streamline customer onboarding and improve the overall experience\nHow Customer Identity can help you stay on top of security and compliance","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5hJGalMQHo33GdRzcv1zsw","type":"Asset","createdAt":"2025-02-11T14:27:12.312Z","updatedAt":"2025-02-11T14:27:12.312Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Sharecard ACCELERATING SUCCESS - 200x628","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5hJGalMQHo33GdRzcv1zsw/2a4729fb1903bc291be2ab93bac9d3c0/Sharecard___ACCELERATING_SUCCESS_-_200x628.png","details":{"size":528169,"image":{"width":1200,"height":628}},"fileName":"Sharecard _ ACCELERATING SUCCESS - 200x628.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"64l5JHWtzEiG5MUPvqsoJi","type":"Asset","createdAt":"2025-02-11T14:25:21.070Z","updatedAt":"2025-02-11T14:25:21.070Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"PDF Accelerating Success","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/64l5JHWtzEiG5MUPvqsoJi/2ea40daf128374d8187210590bce13b6/PDF___Accelerating_Success.pdf","details":{"size":11173195},"fileName":"PDF _ Accelerating Success.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"2. Delivering on the customer experience in a dynamic market\n4. Business opportunities for product teams\n10. How Auth0 delivers value to development and product teams\n12. Final thoughts","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2aznT5wUzOa9fuyPEVETRH","type":"Entry","createdAt":"2025-02-11T14:23:10.201Z","updatedAt":"2025-02-11T14:23:10.201Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001YyUjAAK-aPA4z000000kA4qGAE"},{"type":"ebooks","updatedAt":"2025-02-13T12:46:52.434Z","title":"Why Auth0?","id":"why-auth0-by-okta","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"746ffBBzccujBPMo8iRpwX","type":"Asset","createdAt":"2025-02-11T12:58:15.415Z","updatedAt":"2025-02-13T12:46:28.821Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Thumbnail WhyAuth0 eBook 02062025","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/746ffBBzccujBPMo8iRpwX/ec04d23eac512e6b0aa9ce3b5b11404c/Thumbnail___WhyAuth0_eBook_02062025.png","details":{"size":142434,"image":{"width":600,"height":776}},"fileName":"Thumbnail _ WhyAuth0_eBook_02062025.png","contentType":"image/png"}}},"description":"Customer Identity and Access Management (CIAM) is now rightfully regarded as a way for B2B and B2C organizations, large and small, to catalyze growth, shorten time-to-market, achieve regulatory compliance, and responsibly acquire valuable customer data. Whether you ultimately build an Identity stack in-house or choose instead to incorporate a cloud-based CIAM solution into your applications, our genuine hope is that you make an informed decision that’s best for your users. Download this guide to:\n\nGet a crash course in Customer Identity (spoiler: there’s much, much more to it than almost all technology pros realize)\nLearn why integrating a third-party CIAM solution into your app or service is faster, more cost-effective for your organization, and results in a more secure, stable, and future-proof Identity stack than building something yourself.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1cX2Pi9EudyhC7bhNCE0wp","type":"Asset","createdAt":"2025-02-11T14:38:52.112Z","updatedAt":"2025-02-11T14:38:52.112Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Improving user experiences with CIAM - 1200x628 (2)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1cX2Pi9EudyhC7bhNCE0wp/2f524dee40041377944b313ecf9d1159/Improving_user_experiences_with_CIAM_-_1200x628__2_.png","details":{"size":464877,"image":{"width":1200,"height":628}},"fileName":"Improving user experiences with CIAM - 1200x628 (2).png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2AsZBHFV11soRrSX6rfqxJ","type":"Asset","createdAt":"2025-02-11T13:01:54.171Z","updatedAt":"2025-02-11T13:01:54.171Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"PDF WhyAuth0 eBook 02062025","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2AsZBHFV11soRrSX6rfqxJ/d6f208513b5e9e97c53db5dde5dd3447/PDF___WhyAuth0_eBook_02062025.pdf","details":{"size":1892293},"fileName":"PDF _ WhyAuth0_eBook_02062025.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"## Contents\n\n0. Introduction `2`\n1. Customer Identity crash course: Five things you need to know `3`\n\t1. Customer Identity is sneakily complex, constantly evolving, and under attack `3`\n\t2. Implementing CIAM is a journey `6`\n\t3. Identity has many stakeholders `7`\n\t4. Different customers want different things `8`\n\t5. Identity can force trade-offs between user experiences, security, and privacy `10`\n2. The age-old question — build or buy? `10`\n\t1. POC != product `10`\n\t2. If preserving developer capacity and speeding time to market matters, buying is the way to go `13`\n3. Why do organizations large and small choose Auth0? `15`\n\t1. Unmatched out-of-the-box functionality `15`\n\t2. A sustainable strategic advantage `17`\n\t3. Extensive developer resources to help your team work efficiently and effectively `17`\n\t4. Everything you need to go after enterprise clients `18`\n\t5. Drag-and-drop extensibility to accommodate and enable your Identity-related use cases `18`\n\t6. Security features to protect your organization and customers `19`\n\t7. Discounted — but still feature-rich — offerings `19`\n4. Proven results for organizations like yours `20`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"311SutsjoQV27V3QsKsMJB","type":"Entry","createdAt":"2024-03-07T14:06:27.533Z","updatedAt":"2024-03-07T14:06:27.533Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001YyUaAAK-aPA4z000000TNUeGAO"},{"type":"ebooks","updatedAt":"2024-12-05T19:06:59.339Z","title":"Infographic: Identity Security: The big Security Dimension","id":"identity-security-the-big-security-dimension-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7x3mPVtrXIccXMaxDIrnmE","type":"Asset","createdAt":"2024-12-05T10:15:39.048Z","updatedAt":"2024-12-05T10:15:39.048Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Identity Security: The big Security Dimension","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7x3mPVtrXIccXMaxDIrnmE/29395f567f83e31f63ca4021787de542/Thumbnail_Identity_Security2.png","details":{"size":211961,"image":{"width":600,"height":776}},"fileName":"Thumbnail_Identity_Security2.png","contentType":"image/png"}}},"description":"Identity data has become the new target for cyber attackers, putting your customers and business at risk. But the right Customer Identity and Access Management (CIAM) strategy can stop them in their tracks.\n\nThis infographic reveals the latest Identity attack trends and how modern CIAM solutions like Auth0 by Okta can provide multi-layered defences to:\n\nDetect and block automated bot attacks before they reach your login.\nImplement risk-based authentication to balance security and user experience.\nSafeguard against AI-powered hacking techniques.\nUnify customer Identities for personalised, frictionless experiences.\n\nDiscover how CIAM can help future-proof your business against the next generation of Identity threats. \n\nDownload the infographic to get started.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3aL1S2NO4dKBpSr8Xay86R","type":"Asset","createdAt":"2024-12-05T10:06:04.789Z","updatedAt":"2024-12-05T10:06:04.789Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Share Card Identity Security","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3aL1S2NO4dKBpSr8Xay86R/dab1611cd2a1ed2eba98f4982bbd000a/Share_Card_Identity_Security.png","details":{"size":1368613,"image":{"width":3200,"height":1680}},"fileName":"Share Card_Identity Security.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"9juqm1QmDomU0Bq9QrN7S","type":"Asset","createdAt":"2024-12-05T10:08:24.122Z","updatedAt":"2024-12-05T10:08:24.122Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Identity Security: The big Security Dimension","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/9juqm1QmDomU0Bq9QrN7S/0100cf80fd588525541fb594d641c61e/State-of-Identity-security-infographic.pdf","details":{"size":7253956},"fileName":"State-of-Identity-security-infographic.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Infographic: Identity Security: The big Security Dimension","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5PCnvqN2iEj4yQEQ24tMcs","type":"Entry","createdAt":"2024-07-03T12:11:26.355Z","updatedAt":"2024-07-03T12:11:26.355Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"Initial Release"}}],"language":"EN","ocid":"7014z000001Yqo5AAC-aPA4z000000k9sYGAQ"},{"type":"ebooks","updatedAt":"2024-11-13T18:57:23.516Z","title":"SAML Authentication, Explained","id":"saml-authentication-explained","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7C3Fx4nE9sQGo8HsLNdg85","type":"Asset","createdAt":"2022-02-23T23:23:42.953Z","updatedAt":"2024-11-12T15:01:51.481Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":4,"locale":"en-US"},"fields":{"description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7C3Fx4nE9sQGo8HsLNdg85/5a2b751cd090af7db4d834b4d773c986/Cover_only.png","details":{"size":262010,"image":{"width":600,"height":777}},"fileName":"Cover_only.png","contentType":"image/png"}}},"description":"Security Assertion Markup Language (SAML) is a login standard that helps users access applications based on sessions in another context. It’s a single sign-on (SSO) login method offering more secure authentication (with a better user experience) than usernames and passwords. \n\nIn this eBook, you’ll learn:\n- The advantages to SAML Authentication\n- How to set up a SAML identity provider\n- How SAML Authentication works with Auth0 \n- SAML Configurations for SSO Integrations","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5V9mHz0EpCpDKLJSo4EVVg","type":"Asset","createdAt":"2022-02-23T23:24:01.958Z","updatedAt":"2022-02-23T23:24:01.958Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"SAML Authentication, Explained","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5V9mHz0EpCpDKLJSo4EVVg/797c1dd6e59a193d77e856bbf5c65ec3/EN_Resources_Guide_.png","details":{"size":158125,"image":{"width":1200,"height":600}},"fileName":"EN_Resources_Guide_.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4oKt1Dv0w7E5dC1hFG7HXn","type":"Asset","createdAt":"2022-02-23T23:30:48.423Z","updatedAt":"2024-11-12T15:00:29.341Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"SAML Authentication, Explained","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4oKt1Dv0w7E5dC1hFG7HXn/edf93d8c8d8a1e54d8bea8c8a65b5cca/SAMLAuthentication_ebook.pdf","details":{"size":2778651},"fileName":"SAMLAuthentication_ebook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- Introduction\n- What is SAML\n Benefits of SAML authentication\n- How does SAML authentication work?\n IdP-initiated SAML flow: a deeper look\n- SAML authentication with Auth0\n Prerequisites\n Configure the service provider\n Test it out\n Enable SSO (optional)\n - Conclusion","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1WrMagkhKJFbBjukdrGuVs","type":"Entry","createdAt":"2024-11-13T18:55:39.292Z","updatedAt":"2024-11-13T18:55:39.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.1"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","customCanonicalPath":"/blog/how-saml-authentication-works/","ocid":"7014z000001Ny4iAAC-aPA4z000000015oGAA"},{"type":"ebooks","updatedAt":"2024-09-25T19:35:32.077Z","title":"JWT Handbook","id":"jwt-handbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2B6gm5HYfueAYcos424oum","type":"Asset","createdAt":"2018-03-06T15:33:38.907Z","updatedAt":"2024-06-05T13:50:26.247Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":5,"locale":"en-US"},"fields":{"title":"eBook JWT Handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2B6gm5HYfueAYcos424oum/82487d213bf19f4adecaf2eb7eb1f397/Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png","details":{"size":130598,"image":{"width":600,"height":856}},"fileName":"Captura_de_pantalla_2024-06-05_a_la_s__10.47.37_a._m..png","contentType":"image/png"}}},"description":"Ever wondered how JWT came to be and what problems it was designed to tackle?\nAre you curious about the plethora of algorithms available for signing and encrypting JWTs?\nOr are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2yCvSra7EQYIKyWg0cqQyg","type":"Asset","createdAt":"2018-03-06T15:34:13.446Z","updatedAt":"2019-11-06T11:22:47.110Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"jwt-handbook-tc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2yCvSra7EQYIKyWg0cqQyg/c23954455de302a071a37efed03ab4d2/jwt-handbook-tc.png","details":{"size":161702,"image":{"width":2400,"height":1260}},"fileName":"jwt-handbook-tc.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"0.13.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"o5J4X472PQUI4ai6cAcqg","type":"Asset","createdAt":"2018-03-26T16:24:55.911Z","updatedAt":"2024-06-05T13:41:46.126Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"jwt-handbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/o5J4X472PQUI4ai6cAcqg/3b04b28c3148a640d6eb2713d2cd9877/jwt-handbook-v0_14_2.pdf","details":{"size":1886209},"fileName":"jwt-handbook-v0_14_2.pdf","contentType":"application/pdf"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4zasKqNInea8kYqegOGOMq","type":"Asset","createdAt":"2018-03-26T16:25:49.656Z","updatedAt":"2024-06-05T18:40:40.693Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":4,"locale":"en-US"},"fields":{"title":"jwt-handbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4zasKqNInea8kYqegOGOMq/83aaf063163f4f75290cc19c1fea3361/The_JWT_Handbook_-_Sebastian_E._Peyrott__Auth0_Inc_.mobi","details":{"size":401251},"fileName":"The JWT Handbook - Sebastian E. Peyrott, Auth0 Inc_.mobi","contentType":"application/x-mobipocket-ebook"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"BJLald0W1EO8eOG8oScw0","type":"Asset","createdAt":"2018-03-26T16:25:57.462Z","updatedAt":"2024-06-05T18:40:15.001Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"jwt-handbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/BJLald0W1EO8eOG8oScw0/e0cc2ca8d444fa89e28be9f70be37101/The_JWT_Handbook_-_Sebastian_E._Peyrott__Auth0_Inc_.epub","details":{"size":201803},"fileName":"The JWT Handbook - Sebastian E. Peyrott, Auth0 Inc_.epub","contentType":"application/epub+zip"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1H8TQvb6jyq0ecaQc84cSG","type":"Entry","createdAt":"2018-03-06T15:35:33.525Z","updatedAt":"2018-03-06T15:35:33.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Sebastián Peyrott","twitter":"https://twitter.com/speyrott","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3nPVOrf0jCSIuEc2yOa4is","type":"Asset","createdAt":"2018-03-06T15:34:14.168Z","updatedAt":"2019-11-06T11:22:46.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"sebastian","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3nPVOrf0jCSIuEc2yOa4is/d29bf530cbef6e353b376ace7934afd4/sebastian.png","details":{"size":397911,"image":{"width":700,"height":584}},"fileName":"sebastian.png","contentType":"image/png"}}},"bio":"With a keen interest in native development, Sebastian has worked for 10 years as a software developer.\nHe's gone through mobile game development, Win32 programming, iOS development and even traffic control systems.\nNowadays he enjoys learning and writing about the newest technologies at Auth0."}},"content":"## Contents\n1. Special Thanks `4`\n1. Introduction `5`\n 1. What is a JSON WebToken? `5`\n 1. What problem does it solve? `6`\n 1. A little bit of history `6`\n1. Practical Applications `8`\n 1. Client-side/Stateless Sessions `8`\n 1. Security Considerations `9`\n 1. Signature Stripping `9`\n 1. Cross-Site Request Forgery (CSRF) `10`\n 1. Cross-Site Scripting (XSS) `11`\n 1. Are Client-Side Sessions Useful? `13`\n 1. Example `13`\n 1. FederatedIdentity `16`\n 1. Access and Refresh Tokens `18`\n 1. JWTs and OAuth2 `19`\n 1. JWTs and OpenID Connect `20`\n 1. OpenID Connect Flows and JWTs `20`\n 1. Example `20`\n 1. Setting up Auth0 Lock for Node.js Applications `21`\n1. JSON Web Tokens in Detail `23`\n 1. The Header `24`\n 1. The Payload `25`\n 1. Registered Claims `25`\n 1. Public and Private Claims `26`\n 1. Unsecured JWTs `27`\n 1. Creating an Unsecured JWT `27`\n 1. Sample Code `28`\n 1. Parsing an Unsecured JWT `28`\n 1. Sample Code `29`\n1. JSON Web Signatures `30`\n 1. Structure of a Signed JWT `30`\n 1. Algorithm Overview for Compact Serialization `32`\n 1. Practical Aspects of Signing Algorithms `33`\n 1. JWS Header Claims `36`\n 1. JWS JSON Serialization `36`\n 1. Flattened JWS JSON Serialization `38`\n 1. Signing and Validating Tokens `38`\n 1. HS256: HMAC 1. SHA-256 `39`\n 1. RS256: RSASSA 1. SHA256 `39`\n 1. ES256: ECDSA using P-256 and SHA-256 `40`\n1. JSON Web Encryption (JWE) `41`\n 1. Structure of an Encrypted JWT `44`\n 1. Key Encryption Algorithms `45`\n 1. Key Management Modes `46`\n 1. Content Encryption Key (CEK) and JWE Encryption Key `47`\n 1. Content Encryption Algorithms `48`\n 1. The Header `48`\n 1. Algorithm Overview for Compact Serialization `49`\n 1. JWE JSON Serialization `50`\n 1. Flattened JWE JSON Serialization `52`\n 1. Encrypting and Decrypting Tokens `52`\n 1. Introduction: Managing Keys with node-jose `52`\n 1. AES-128 Key Wrap (Key) 1. AES-128 GCM (Content) `54`\n 1. RSAES-OAEP (Key) 1. AES-128 CBC 1. SHA-256 (Content) `54`\n 1. ECDH-ESP-256 (Key)1. AES-128 GCM (Content) `55`\n 1. Nested JWT: ECDSA using P-256 and SHA-256 (Signature) 1. RSAES-OAEP (Encrypted Key) 1. AES-128 CBC 1. SHA-256 (Encrypted Content) `55`\n 1. Decryption `56`\n1. JSON Web Keys (JWK) `58`\n 1. Structure of a JSON Web Key `59`\n 1. JSON Web Key Set `60`\n1. JSON Web Algorithms `61`\n 1. General Algorithms `61`\n 1. Base64 `61`\n 1. Base64-URL `63`\n 1. Sample Code `63`\n 1. SHA `64`\n 1. Signing Algorithms `69`\n 1. HMAC `69`\n 1. HMAC 1. SHA256 (HS256) `71`\n 1. RSA `73`\n 1. Choosing e, d and n `75`\n 1. Basic Signing `76`\n 1. RS256: RSASSA PKCS1 v1.5 using SHA-256 `76`\n 1. Algorithm `76`\n 1. EMSA-PKCS1-v1_5 primitive `78`\n 1. OS2IP primitive `79`\n 1. RSASP1 primitive `79`\n 1. RSAVP1 primitive `80`\n 1. I2OSP primitive `80`\n 1. Samplecode `81`\n 1. PS256: RSASSA-PSS using SHA-256 and MGF1 with SHA-256 `86`\n 1. Algorithm `86`\n 1. MGF1: the mask generation function `87`\n 1. EMSA-PSS-ENCODE primitive `88`\n 1. EMSA-PSS-VERIFY primitive `89`\n 1. Sample code `91`\n 1. Elliptic Curve `94`\n 1. Elliptic-Curve Arithmetic `96`\n 1. Point Addition `96`\n 1. Point Doubling `97`\n 1. Scalar Multiplication `97`\n 1. Elliptic-Curve Digital Signature Algorithm (ECDSA) `98`\n 1. Elliptic-Curve Domain Parameters `100`\n 1. Public and Private Keys `101`\n 1. The Discrete Logarithm Problem `101`\n 1. ES256: ECDSA using P-256 and SHA-256 `101`\n 1. Future Updates `104`\n","release_details":["Elliptic-Curve crypto introduction.","Elliptic-Curve Digital Signature Algorithm description.","Clean-room sample implementation of ES256 (ECDSA with P-256 and SHA-256)."],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2q8ohhi7FaCyWksCaOOsCm","type":"Entry","createdAt":"2018-03-26T15:45:14.921Z","updatedAt":"2018-03-26T16:07:42.554Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"0.14.1","description":"#### New:\n- Added Annex A: JWT Best Current Practices (based on draft from IETF OAuth Working Group)\n\n#### Fixes:\n- Changed deprecated Pandoc command line parameter.\n- Fixed typos."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6zvoTenoZoCMsgPxhETGQo","type":"Asset","createdAt":"2020-09-29T22:12:39.276Z","updatedAt":"2020-09-29T22:12:39.276Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"JWT","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6zvoTenoZoCMsgPxhETGQo/becf2e526c0e31a069439b27eaacc7b0/resource_thumb_44.jpg","details":{"size":50286,"image":{"width":581,"height":388}},"fileName":"resource_thumb_44.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The JWT Handbook 📖 by @auth0. Everything you wanted to know about JWTs in one place. Check it out! https://auth0.com/resources/ebooks/jwt-handbook","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1sFcTrvMtSAuuiiaIaOI2A","type":"Asset","createdAt":"2018-04-23T19:56:15.329Z","updatedAt":"2019-11-06T11:21:51.941Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"jwt-handbook","description":"jwt-handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1sFcTrvMtSAuuiiaIaOI2A/204632e9daec668e1083c433363eee9f/jwt.png","details":{"size":27167,"image":{"width":628,"height":500}},"fileName":"jwt.png","contentType":"image/png"}}},"ocid":"7014z000001YoSdAAK-aPA4z000000010mGAA"},{"type":"ebooks","updatedAt":"2024-07-09T12:52:06.401Z","title":"The Passkeys Handbook","id":"the-passkeys-handbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"eQGisKo3KuzNG5iHP5OXq","type":"Asset","createdAt":"2024-07-03T12:04:01.000Z","updatedAt":"2024-07-03T13:14:06.302Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"The Passkeys Handbook - Resource page thumbnail","description":"The Passkeys Handbook - Resource page thumbnail","file":{"url":"//images.ctfassets.net/2ntc334xpx65/eQGisKo3KuzNG5iHP5OXq/878c1f97f150e28f59714d36bb0a6d88/Cover_only__1_.png","details":{"size":243469,"image":{"width":600,"height":777}},"fileName":"Cover_only (1).png","contentType":"image/png"}}},"description":"A guide to exploring passkeys, the most secure alternative to passwords for protecting your online identity.\nWhether you are a curious user, a developer, or a software architect, this guide will help you understand the importance of passkeys, how they work, and how to integrate them into your applications.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lb7uCmqf8MCf72wUduHEh","type":"Asset","createdAt":"2024-07-03T12:22:58.702Z","updatedAt":"2024-07-03T12:23:27.022Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"The Passkeys Handbook | Auth0","description":"A guide to exploring passkeys, the most secure alternative to passwords for protecting your online identity.","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lb7uCmqf8MCf72wUduHEh/5cc82ceffb154d794e1cd2ed28b26d44/share.jpg","details":{"size":57156,"image":{"width":1600,"height":840}},"fileName":"share.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7jfQAStcmU1cooRQTA7JI9","type":"Asset","createdAt":"2024-07-03T12:12:34.394Z","updatedAt":"2024-07-03T12:12:34.394Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"PasskeysHandbook 1.0","description":"Passkeys Handbook 1.0","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7jfQAStcmU1cooRQTA7JI9/355e449e0158fbd086703663abad1515/PasskeysHandbook.pdf","details":{"size":3537652},"fileName":"PasskeysHandbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2Neq1AKoxDQ6t8oRzN4lJX","type":"Entry","createdAt":"2024-07-03T11:55:09.212Z","updatedAt":"2024-07-03T11:55:09.212Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Philippe De Ryck","job_title":"Web Security Expert, Founder of Pragmatic Web Security","twitter":"https://twitter.com/PhilippeDeRyck","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5HJfbaJXnJHzmyyZQSo5k1","type":"Asset","createdAt":"2024-07-03T11:54:52.260Z","updatedAt":"2024-07-03T11:54:52.260Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Philippe De Ryck","description":"Philippe De Ryck ","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5HJfbaJXnJHzmyyZQSo5k1/0e678a1d43b8ef6ed9b7e265ac6a60db/philippederyck.jpg","details":{"size":269522,"image":{"width":472,"height":472}},"fileName":"philippederyck.jpg","contentType":"image/jpeg"}}},"bio":"Philippe De Ryck helps developers protect companies through better web security. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. As the founder of Pragmatic Web Security, Philippe delivers security training and security consulting to companies worldwide. His online course platform allows anyone to learn complex security topics at their own pace. Philippe is a Google Developer Expert and an Auth0 Ambassador/Expert for his community contributions on the security of web applications and APIs."}},"content":"## Contents\n\n1. Chapter 1: The Why and What of Passkeys\n2. Chapter 2: Using Passkeys to Secure Your Account\n3. Chapter 3: The Technicalities of Passkeys\n4. Chapter 4: Integrating Passkeys in Your Applications\n5. Passkeys: A one page summary","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5PCnvqN2iEj4yQEQ24tMcs","type":"Entry","createdAt":"2024-07-03T12:11:26.355Z","updatedAt":"2024-07-03T12:11:26.355Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"Initial Release"}}],"language":"EN","ocid":"7014z000001Nx9BAAS-aPA4z000000TNYgGAO"},{"type":"ebooks","updatedAt":"2024-03-26T10:28:16.393Z","title":".NET Identity with Auth0","id":"net-identity-with-auth0","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"17p4gILruAd4I0v5za93Gl","type":"Asset","createdAt":"2022-09-16T21:24:02.135Z","updatedAt":"2022-09-19T16:06:09.023Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":".NET Identity with Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/17p4gILruAd4I0v5za93Gl/3b4445c5819ca4a795e028f6607a6a6a/Landing_Page-.NET_Identity_with_Auth0.jpeg","details":{"size":112797,"image":{"width":600,"height":856}},"fileName":"Landing Page-.NET Identity with Auth0.jpeg","contentType":"image/jpeg"}}},"description":"__A guide to using Auth0 in .NET applications__\n\nThe recent evolution of .NET aims to provide one development platform for any kind of application and operating system. While the .NET platform aims to relieve the developer’s burden in building applications, Auth0 helps make them more secure by simplifying Identity and Access Management.\n\nThis book will show you how to leverage Auth0’s authentication and authorization services in the various application types you can create with .NET.\n\nThroughout the book, you will be guided in the steps for adding Auth0 to your applications with a practical approach. You will build and integrate simple applications to learn by doing and will have the opportunity to download their code to play with.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HIk3gXvB0L0AMYSfQBeUg","type":"Asset","createdAt":"2022-09-16T21:25:24.420Z","updatedAt":"2022-09-16T21:25:24.420Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":".NET Identity with Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HIk3gXvB0L0AMYSfQBeUg/a8de69f4ebfb8586ec6f690a1f388286/Share_Asset-.NET_Identity_with_Auth0.jpeg","details":{"size":835109,"image":{"width":5000,"height":2432}},"fileName":"Share Asset-.NET Identity with Auth0.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4d5TQFqckaPgxzdFnJPvqa","type":"Asset","createdAt":"2024-03-26T10:27:49.110Z","updatedAt":"2024-03-26T10:27:49.110Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":".NET Identity with Auth0 1.1","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4d5TQFqckaPgxzdFnJPvqa/2e77b4bc270a7d166502968e49531db9/dotnet-identity-with-auth0-11.pdf","details":{"size":7500788},"fileName":"dotnet-identity-with-auth0-11.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"zpHSo9DYixXJLIdB8xux9","type":"Entry","createdAt":"2022-04-27T22:35:23.150Z","updatedAt":"2022-04-27T22:35:23.150Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Andrea Chiarelli","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"yEaI6ZJiIoAFJAZKSvkkD","type":"Asset","createdAt":"2022-04-27T22:35:14.800Z","updatedAt":"2022-04-27T22:35:14.800Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Andrea Chiarelli","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/yEaI6ZJiIoAFJAZKSvkkD/5c139bf4c495c319b2c2fc4c2dc3b3ab/andrea-chiarelli.jpeg","details":{"size":23483,"image":{"width":400,"height":400}},"fileName":"andrea-chiarelli.jpeg","contentType":"image/jpeg"}}}}},"content":"## Contents\n\n1. Introduction\n2. Chapter 1 - Authentication and Authorization\n3. Chapter 2 - Introduction to Auth0 21\n4. Chapter 3 - Regular Web Applications\n5. Chapter 4 - APIs\n6. Chapter 5 - Single-Page Applications\n7. Chapter 6 - Native Applications\n8. Conclusion","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"65Qyg1ZPi3E9IuFwCuQ0xf","type":"Entry","createdAt":"2024-03-26T10:22:34.552Z","updatedAt":"2024-03-26T10:22:34.552Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.1","description":"- Most content has been converted to .NET 8\n- Addition of Blazor 8 content\n- Added a new chapter related to .NET MAUI\n- Typo fixing"}}],"language":"EN","ocid":"7014z000001cbrSAAQ-aPA4z0000008ObaGAE"},{"type":"ebooks","updatedAt":"2023-11-02T17:23:03.268Z","title":"The Ultimate Guide to Content Security Policy (CSP)","id":"the-ultimate-guide-to-csp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6GnjSym6UsMQ4ee46mQDzl","type":"Asset","createdAt":"2023-11-01T13:37:28.437Z","updatedAt":"2023-11-02T17:09:49.361Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Screenshot 2023-10-30 at 16.37.14","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6GnjSym6UsMQ4ee46mQDzl/0eddfdb915b5dbcc2b7fbb15a52726ab/Screenshot_2023-10-30_at_16.37.14.png","details":{"size":318244,"image":{"width":600,"height":856}},"fileName":"Screenshot 2023-10-30 at 16.37.14.png","contentType":"image/png"}}},"description":"Throughout this ebook, you will learn what Content Security Policy (CSP) is, how to configure CSP, what it can do for you, and how you use CSP effectively in modern applications.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7fsVWx9ic9x4PhvUSUIRZm","type":"Asset","createdAt":"2023-11-01T14:37:42.016Z","updatedAt":"2023-11-01T14:37:42.016Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"ebook twitter card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7fsVWx9ic9x4PhvUSUIRZm/54e24f500b9199a6862c76d4697485b1/ebook_twitter_card.jpeg","details":{"size":657575,"image":{"width":5000,"height":2432}},"fileName":"ebook twitter card.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ifyumfTlKOiIL1S8laAVL","type":"Asset","createdAt":"2023-11-01T12:02:30.193Z","updatedAt":"2023-11-01T12:02:30.193Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 ebook 1023 UPDATED","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7ifyumfTlKOiIL1S8laAVL/d8019901cea11cf81518bc43e4deddda/Auth0_ebook_1023_UPDATED.pdf","details":{"size":3454554},"fileName":"Auth0_ebook_1023 UPDATED.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"## Contents\n1. Introduction `4`\n2. Chapter 1 - Using CSP as an XSS Defense `8`\n 1. What is a JSON WebToken? `5`\n 2. CSP Hashes and Nonces `12`\n 3. Intermezzo: CSP by Example `17`\n 4. Bypassing URL-based CSP Policies `24`\n 5. Explicit and Implicit Trust Propagation `26`\n 6. Case Study: Google's CSP Policy `29`\n 7. Additional details `35`\n 8. Controlling Script Code with CSP Level 3 `38`\n 9. Conclusion `39`\n3. Chapter 2 -Controlling Various Resources and Behaviour with CSP `40`\n 1. Setting a Default Directive `41`\n 2. Controlling Resource Loading with CSP `43`\n 3. Controlling Outgoing Connections with CSP `45` \n 4. Controlling Behavior with CSP `45`\n 5. Case Study: GitHub's CSP Policy `47`\n 6. Conclusion `51`\n4. Chapter 3 - Securing Single Page Apps with CSP `52`\n 1. Securing Single Page Apps with CSP `53`\n 3. The Challenges with SPAs `53` \n 3. Keep It Simple `55` \n 4. Using 'strict-dynamic' with Hashes `57` \n 5. Using 'strict-dynamic' with Nonces `60`\n 6. Overview of CSP for SPAs `63`\n 7. Conclusion `65`\n5. Chapter 4 - Developing CSP in practice `66`\n 1. Deploying CSP in practice `66`\n 2. Deploying CSP in Report-Only Mode `67`\n 3. CSP Reporting in Blocking Mode `71`\n 4. Conclusion `75`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"50lcc42OkZg79WFVsdT8aF","type":"Entry","createdAt":"2023-11-01T12:05:36.930Z","updatedAt":"2023-11-02T17:11:58.996Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001NvVqAAK-aPA4z000000TNPAGA4"},{"type":"ebooks","updatedAt":"2023-08-09T15:35:21.059Z","title":"Implementing MFA in React Using Auth0 and AWS Amplify","id":"implementing-mfa-in-react-using-auth0-aws","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"f5Nvn50DZqeLonsg75SnG","type":"Asset","createdAt":"2021-06-24T16:24:59.538Z","updatedAt":"2021-06-24T16:24:59.538Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Implementing MFA in React Using Auth0 and AWS Amplify","file":{"url":"//images.ctfassets.net/2ntc334xpx65/f5Nvn50DZqeLonsg75SnG/17ad9470af8a451e01fa1a1c858de3f9/Auth0_AWS_Amplify_eBook_Cover.jpg","details":{"size":173469,"image":{"width":600,"height":856}},"fileName":"Auth0+AWS Amplify eBook_Cover.jpg","contentType":"image/jpeg"}}},"description":"By Roy Rodan, Partner Solutions Architect – AWS; Mark Kriaf, Partner Solutions Architects – AWS; Michele Riso - AWS Certified Solutions Architect Professional \n\nThis guide showcases the simplicity of adding Multi-Factor Authentication (MFA) to a React Single-Page Application (SPA) using Auth0 and AWS Amplify.\n\n[AWS Amplify](https://aws.amazon.com/amplify/) is a set of tools and services that can be used, together or on their own, to help frontend web and mobile developers build scalable full stack applications.\n\nWith Amplify, you can configure app backends and connect your app in minutes, deploy static web apps in a few clicks, and easily manage app content outside the [AWS Management Console](https://aws.amazon.com/console/).\n\n[Auth0](https://auth0.com/partners/aws) is an [AWS ISV Partner](https://partners.amazonaws.com/partners/001E000000YKGRTIA5/Auth0) with Competency designations in Security and Mobile. Auth0 helps developers secure their applications by providing an easy-to-implement, adaptable authentication and authorization platform.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"Eagv6rQqHTwkCmU265Iwg","type":"Asset","createdAt":"2021-06-23T23:00:50.555Z","updatedAt":"2021-06-23T23:00:50.555Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Implementing MFA in React Using Auth0 and AWS Amplify","file":{"url":"//images.ctfassets.net/2ntc334xpx65/Eagv6rQqHTwkCmU265Iwg/fd0a52bb8eb4e6b874c2fe85cf7c349d/AWS_Amplify___Auth0_eBook_-Share_Asset-___Horizontal_.jpeg","details":{"size":1155692,"image":{"width":5000,"height":2432}},"fileName":"AWS Amplify + Auth0 eBook [Share Asset] (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"2.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4VGzJruiiw3WRjeckE7hmv","type":"Asset","createdAt":"2021-06-23T23:01:28.078Z","updatedAt":"2023-08-08T21:03:45.422Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":4,"locale":"en-US"},"fields":{"title":"Implementing MFA in React Using Auth0 and AWS Amplify","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4VGzJruiiw3WRjeckE7hmv/8d264dfa3e342fd997812e24938fc01d/Implement_MFA_in_React_using_Auth0_and_AWS_Amplify.pdf","details":{"size":856821},"fileName":"Implement_MFA_in_React_using_Auth0_and_AWS_Amplify.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"I. React Configuration\nII. AWS Amplify Configuration\nIII. Auth0 URL Configuration","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6NspL9XE3MsXr7H8neRTmu","type":"Entry","createdAt":"2023-08-09T15:35:03.514Z","updatedAt":"2023-08-09T15:35:03.514Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"2.0","description":"- Updated React and Auth0 SDK for React versions\n- Code migration from Rules to Auth0 Actions\n- Updated the code to follow the latest best practices and recommendations"}}],"language":"EN","ocid":"7014z000001cb6BAAQ-aPA4z000000013vGAA"},{"type":"ebooks","updatedAt":"2023-06-08T21:53:30.268Z","title":"Angular Handbook: Identity and State Management","id":"angular-handbook-identity-and-state-management","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2MI8l4l0Cka4q3IAQebIhi","type":"Asset","createdAt":"2023-06-08T21:37:57.310Z","updatedAt":"2023-06-08T21:43:44.079Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Angular Handbook: Identity and State Management","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2MI8l4l0Cka4q3IAQebIhi/8d1dca0bd696978227ed39ea363be8e1/AngularHandbook-cover.jpg","details":{"size":43988,"image":{"width":600,"height":856}},"fileName":"AngularHandbook-cover.jpg","contentType":"image/jpeg"}}},"description":"Angular is an application design framework and development platform to create efficient and sophisticated single-page applications. While Angular helps developers build robust applications fast, Auth0 helps developers secure those applications quickly by simplifying the implementation of Identity and Access Management.\n\nThis handbook provides you with a practical approach on how to use Angular and Auth0 to build and secure an admin dashboard.\n\n----------\n\nRelease Notes\n\n- Create and configure web applications in the Auth0 dashboard\n- Setup an Angular application and secure it using Auth0\n- Use NgRx to manage your application's state\n- Integrate Auth0 with NgRx to manage user-related stat","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6BiaWS3mrNbXmNxAXdoUj0","type":"Asset","createdAt":"2023-06-08T21:39:24.968Z","updatedAt":"2023-06-08T21:39:24.968Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Angular Handbook: Identity and State Management","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6BiaWS3mrNbXmNxAXdoUj0/762592e9b748cdf6f815a4fcfba480f6/AngularHandbook-share.png","details":{"size":75677,"image":{"width":1250,"height":608}},"fileName":"AngularHandbook-share.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2Sm4FHUrIWXX4cZbPW0Ucu","type":"Asset","createdAt":"2023-06-08T21:40:49.345Z","updatedAt":"2023-08-08T18:41:52.322Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"Angular Handbook: Identity and State Management","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2Sm4FHUrIWXX4cZbPW0Ucu/de915283521b17b326f821111bc8282f/Angular_Handbook_-_Identity_and_State_Management.pdf","details":{"size":4700072},"fileName":"Angular_Handbook_-_Identity_and_State_Management.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Introduction 05\n\nChapter 1 - Navigating and Routing 07\n- Routers Configuration 08\n- How it works 14\n- Nested Router Outlet 16\n- Navigation 24\n- Programmatically 25\n- Styling and Theming 28\n- Component Level Styling 36\n- Inline 38\n- Pages and Layouts 40\n- Layout Components 75\n- Dispaly Local Data 97\n- Using the MenuStateService 113\n- Form Handling 154\n- Display External Data 187\n\nChapter 2 - How to manage State Better 200\n- Intro to NgRx 201\n- Configure NgRx 204\n- Menu State Management 210\n- Create Menu Action 212\n- Update Application to Use Menu Actions 221\n- Create Menu Selectors 228\n- Update Applications to Use Menu Selectors 231\n- Create Menu Reducer 239\n- Configure Store Module 242\n- Create Menu Effects 244\n- User State Management 252\n- Create User Reducer 265\n- Create User Effects 267\n\nChapter 3 - How to Secure The Dashboard 270\n- Intro to Auth0 271\n- Configure Auth0 272\n- Instal Auth0 274\n- Connect Angular with Auth0 274\n- Update AppModule 276\n- Connect External API with Auth0 279\n- Login and Logout 280\n- Make Secure API Calls 286\n- Secure Routes 295\n- Auth0’s Route Guards 296\n- Configure Route Guards 297\n- Display User Profile 300\n- Role Based Acces Control 305\n- Show/Hide “Add” Button 312\n- Show/Hide “Edit” and “Delete” Button 315\n\nConclusion 320","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001t82NAAQ-aPA4z000000PBHlGAO"},{"type":"ebooks","updatedAt":"2023-03-03T19:53:17.315Z","title":"Secured and Assured Unit 4 Workbook","id":"secured-and-assured-unit-4-workbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"hvMDig7Qz2B5pvhV1nxqg","type":"Asset","createdAt":"2023-03-03T19:49:49.379Z","updatedAt":"2023-03-03T19:49:49.379Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 4","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/hvMDig7Qz2B5pvhV1nxqg/c5f6072d3dcc126fc5e89277222dcde5/-Landing_Page-_S_A4.jpeg","details":{"size":142786,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A4.jpeg","contentType":"image/jpeg"}}},"description":"In Secured and Assured Unit 4, we’re going to take a look at what data privacy is (and isn’t), go over some best practices and a solution that can help organizations with their privacy needs, and then wrap it up with a review of all the material covered in this unit. It’s short, but packed full of useful information you can apply right away.\n\nHere are some highlights of Unit 4’s Learning Outcomes:\n- What data privacy is and is not\n- How to ensure privacy is priority at your organization\n- Learn how privacy + consent can build trust and help meet compliance\n- Why organizations should practice the data minimization collection principle\n- What CIAM is \u0026 how it helps with privacy","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"20AgFxyzHGMsLe7NuAFBmG","type":"Asset","createdAt":"2023-03-03T19:50:14.699Z","updatedAt":"2023-03-03T19:50:14.699Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 4 Workbook","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/20AgFxyzHGMsLe7NuAFBmG/5991ce982e727d9d42943f1275534a74/-Share_Asset-_Whitepaper__Horizontal_.jpeg","details":{"size":1019944,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5uEn7y9ItcLuJLjuqIxtsl","type":"Asset","createdAt":"2023-03-03T19:52:11.433Z","updatedAt":"2023-03-03T19:52:11.433Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 4 Workbook","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/5uEn7y9ItcLuJLjuqIxtsl/1520526a36e6c077b8944d6050f0ae8e/Secured-and-Assured-Unit-4-Workbook.pdf","details":{"size":22626261},"fileName":"Secured-and-Assured-Unit-4-Workbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"# Contents\n\nIntroduction\nSecured and Assured Unit 4\nGet to Know Data Privacy\nData Privacy Best Practices\nCIAM Customer Identity Access Management Unit 4 Review\nKey Takeaways\nReview Questions\nAdditional Resources\nUnit 4 Review Answer Key","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001t0wcAAA-aPA4z000000PBAJGA4"},{"type":"ebooks","updatedAt":"2023-03-03T19:40:09.208Z","title":"Secured and Assured Unit 3 Workbook","id":"secured-and-assured-unit-3-workbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2IGhBthTYcD52tr8DN3Ehi","type":"Asset","createdAt":"2023-03-03T19:33:55.126Z","updatedAt":"2023-03-03T19:34:03.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 3","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2IGhBthTYcD52tr8DN3Ehi/df12f73205c6b55bfb08cf1f576e522a/-Landing_Page-_S_A3.jpeg","details":{"size":185554,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A3.jpeg","contentType":"image/jpeg"}}},"description":"This Workbook, Secured and Assured Unit 3, teaches about the three states of data, reviewing some practices for each along with some corresponding tools often used by impact organizations and other businesses, and finally a brief review of the material covered in Data Protection.\n\nHere are some highlights of Unit 3’s Learning Outcomes:\n- The 3 states of data to protect\n- Best practices for protecting Data in-Transit, in-Use, and at-Rest\n- What encryption and tokenization is\n- Tools that can help protect data","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Yt3qf3w3JTJYP1XJHT40E","type":"Asset","createdAt":"2023-03-03T19:38:27.611Z","updatedAt":"2023-03-03T19:38:27.611Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 3 Workbook","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Yt3qf3w3JTJYP1XJHT40E/5e16c0d5f12433684e93f5985cc12b04/-Share_Asset-_Whitepaper__Horizontal___1_.jpeg","details":{"size":1048200,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal) (1).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6t99pqn5I874afMyYdx3qL","type":"Asset","createdAt":"2023-03-03T19:39:19.188Z","updatedAt":"2023-03-03T19:39:19.188Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 3 Workbook","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/6t99pqn5I874afMyYdx3qL/fcff08480074212f69bf01455b2352da/Secured-and-Assured-Unit-3-Workbook.pdf","details":{"size":22891235},"fileName":"Secured-and-Assured-Unit-3-Workbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"# Contents\n\nIntroduction\nSecured and Assured Unit 3\nThe 3 States of Data\nData in-Transit\nBest Practices for Protecting Data in-Transit Encryption \u0026 Tokenization\nData in-Use\nBest Practices for Protecting Data in-Use Data at-Rest\nBest Practices for Protecting Data at-Rest Encryption \u0026 Tokenization\nUnit 3 Review\nReview Questions\nAdditional Resources\nUnit 3 Review Answer Key","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001t0waAAA-aPA4z000000PBAHGA4"},{"type":"ebooks","updatedAt":"2023-03-03T19:19:59.068Z","title":"Secured and Assured Unit 2 Workbook","id":"secured-and-assured-unit-2-workbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"239s2QBg4WwGpf5Q1yK07U","type":"Asset","createdAt":"2023-03-03T19:15:37.560Z","updatedAt":"2023-03-03T19:40:55.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 2","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/239s2QBg4WwGpf5Q1yK07U/2f584f88df43d5d54bc40bd5ca17d3b7/-Landing_Page-_S_A2.jpeg","details":{"size":156288,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A2.jpeg","contentType":"image/jpeg"}}},"description":"Navigating the ever-changing world of data compliance, protection, and privacy can be challenging, even for experienced professionals. However, it's crucial for leaders and individual contributors to understand key concepts, nomenclature, systems, and toolsets in a digital-first world, especially during a time of digital transformation. \n\nThis Workbook, Secured and Assured Unit 2, discusses best practices for data security and reviews the systems and components that make up the tools used by organizations around the world to help secure their infrastructure and digital assets. \n\nHere are some highlights of Unit 2’s Learning Outcomes:\n- Learn what an authentication and authorization system is and how it works to help secure data at the source\n- Understand the ins and outs of SSO, MFA, Passwordless, and Layered Protection mechanisms \n- Get to know IAM; the framework, system and the application behind every login","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"KKKPVTY5tlj6mk7H16cb0","type":"Asset","createdAt":"2023-03-03T19:16:02.303Z","updatedAt":"2023-03-03T19:16:02.303Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 2 Workbook","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/KKKPVTY5tlj6mk7H16cb0/791190efc7665b7c241220182a6ad2fd/-Share_Asset-_Whitepaper__Horizontal_.jpeg","details":{"size":957181,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2AkCAeZ3655rf3vfm1gOox","type":"Asset","createdAt":"2023-03-03T19:19:45.223Z","updatedAt":"2023-03-03T19:19:45.223Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 2 Workbook","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/2AkCAeZ3655rf3vfm1gOox/0e731c7ecfde48403ba475388b6ee54e/Secured-and-Assured-Unit-2-Workbook.pdf","details":{"size":12272674},"fileName":"Secured-and-Assured-Unit-2-Workbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"# Contents\n\nIntroduction\nSecured and Assured Unit 2\nData Security Best Practice #1\nSystems Used to Safeguard Data at the Source\nComponents Used in Some Authentication \u0026 Authorization Systems\nAdditional Components Used in Some Authentication \u0026 Authorization Systems\nData Security Best Practice #2\nSystems Used to Provide and Manage Access to Data\nSystems Used to Provide all-in-one Authentication, Authorization, and Access Management of Data\nUnit 2 Review\nReview Questions Additional Resources\nUnit 2 Review Answer Key","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001t0wYAAQ-aPA4z000000PBAFGA4"},{"type":"ebooks","updatedAt":"2023-03-03T18:57:17.395Z","title":"Secured and Assured Unit 1 Workbook","id":"secured-and-assured-unit-1-workbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ZT55dKPgWbvAmBoNIMKUT","type":"Asset","createdAt":"2023-03-03T18:34:10.775Z","updatedAt":"2023-03-03T18:45:31.671Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 1","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ZT55dKPgWbvAmBoNIMKUT/1bdf336074fb7a9c01323551a947ab99/-Landing_Page-_S_A1.jpeg","details":{"size":109656,"image":{"width":600,"height":856}},"fileName":"-Landing Page- S+A1.jpeg","contentType":"image/jpeg"}}},"description":"Navigating the ever-changing world of data compliance, protection, and privacy can be challenging, even for experienced professionals. However, it's crucial for leaders and individual contributors to understand key concepts, nomenclature, systems, and toolsets in a digital-first world, especially during a time of digital transformation. \n\nThis Workbook, Secured and Assured Unit 1, addresses critical concepts in data privacy, protection, and security and how they relate to data compliance.\n\nBy prioritizing cyber-wellness and compliance, organizations can mitigate legal risk and build trust and transparency with external audiences. Download our guide today to gain the knowledge and skills needed to succeed in today's data-driven landscape.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"43uTMVcvb9o59fTPrAW01b","type":"Asset","createdAt":"2023-03-03T18:40:21.831Z","updatedAt":"2023-03-03T18:41:42.363Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 1","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/43uTMVcvb9o59fTPrAW01b/d275aa69cdd0d73789f2fc559f0a7ac1/-Share_Asset-_Whitepaper__Horizontal___1_.jpeg","details":{"size":883057,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal) (1).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13qJe3PWGAjsuurBFfsocS","type":"Asset","createdAt":"2023-03-03T18:56:34.876Z","updatedAt":"2023-03-03T18:56:34.876Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Secured and Assured Unit 1 Workbook","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/13qJe3PWGAjsuurBFfsocS/c972e55c6a4a17698b2d053096d57893/Secured-and-Assured-Unit-1-Workbook.pdf","details":{"size":7533035},"fileName":"Secured-and-Assured-Unit-1-Workbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"# Contents\n\nIntroduction\nSecured and Assured Unit 1\nKey Data Privacy, Protection, and Security Concepts\nData Privacy\nData Protection\nData Security\nData by Type and Compliance Measures\nUnit 1 Review\nKey Takeaways\nThinking About Compliance\nAdditional Resources","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001t0wWAAQ-aPA4z000000PBADGA4"},{"type":"ebooks","updatedAt":"2022-09-22T21:26:32.079Z","title":"Enterprise-Ready Identity","id":"enterprise-ready-identity","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2enIs6tamYOMGhgSrZFZWZ","type":"Asset","createdAt":"2022-09-22T21:26:23.250Z","updatedAt":"2022-09-22T21:26:23.250Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Enterprise-Ready Identity Guide","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2enIs6tamYOMGhgSrZFZWZ/8a88fb944f787f60065142d327b173e8/Enterprise-Ready_Identity_Guide_-_Thumbnail.png","details":{"size":394646,"image":{"width":600,"height":856}},"fileName":"Enterprise-Ready Identity Guide - Thumbnail.png","contentType":"image/png"}}},"description":"For a small or medium-sized business (SMB), signing a deal with their first enterprise customer is a big deal. Going upmarket is frequently a goal and sometimes a necessity for B2B SaaS vendors, but it isn’t easy. \n\nIn addition to ensuring your core features meet the needs of enterprise buyers, you also have to satisfy a long list of additional requirements in other areas like security, compliance, and scalability—all of which identity plays a crucial role in. While the needs of SMB customers may have been met with straightforward authentication, authorization, and identity management features, enterprise decision-makers expect much more.\n\nIn this guide, we will walk through the identity requirements and the ancillary functionality that enterprises need while highlighting what you — the B2B SaaS vendor — need from your customer identity implementation to scale your business sustainably.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"JTf3L6RRUpLHqG83ZVJfS","type":"Asset","createdAt":"2022-09-22T19:48:56.313Z","updatedAt":"2022-09-22T19:48:56.313Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Enterprise-Ready Identity","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/JTf3L6RRUpLHqG83ZVJfS/9ba37edb1f425d923afcd975f1c1ae6d/Enterprise-Ready_Identity_-_Social.png","details":{"size":5365554,"image":{"width":20833,"height":10133}},"fileName":"Enterprise-Ready Identity - Social.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aexABIDc4dIBhCcGBy79P","type":"Asset","createdAt":"2022-09-20T14:26:50.166Z","updatedAt":"2022-09-20T14:26:50.166Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Enterprise-Ready Identity","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6aexABIDc4dIBhCcGBy79P/6cdbdd78ff708eced31370d205c5c93a/Enterprise-Ready_Identity.pdf","details":{"size":282719},"fileName":"Enterprise-Ready Identity.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"## Contents\n\n1. Introduction\n 2. Trading control for opportunity: Meet the new boss\n 3. Identity is essential to enterprise buyers\n4. Enterprise Identity Requirements\n 5. Enterprise single sign-on (SSO)\n 6. Authorization and access control\n 7. Multi-factor Authentication (MFA)\n 8. Beyond the basics\n9. Additional Requirements\n 10. Availability\n 11. Scalability\n 12. Identity security\n 13. Compliance and certifications\n 14. Monitoring and logging\n 15. Other potential requirements\n16. Summing it all up\n 17. Grow your SaaS applications, one login at a time","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cbtTAAQ-aPA4z0000008Oc9GAE"},{"type":"ebooks","updatedAt":"2022-09-10T18:51:02.525Z","title":"The Log Inn #NoDistractions","id":"log-inn-no-distractions","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3mSawbeWF4CqKcNxg5q4DK","type":"Asset","createdAt":"2022-08-21T01:16:06.376Z","updatedAt":"2022-09-10T18:06:46.795Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"The Log Inn #NoDistractions","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3mSawbeWF4CqKcNxg5q4DK/1b9d563fe91d7a826a206f3465bd027e/nodistractionsthumbnail.png","details":{"size":787654,"image":{"width":600,"height":856}},"fileName":"nodistractionsthumbnail.png","contentType":"image/png"}}},"description":"__How leaders unlock value in their business.__\n\nWe provide you with exclusive industry insights into how leaders can align their business strategies with their technical development to maximize their ROI.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UtYw39O5NVFy9H9y3vif0","type":"Asset","createdAt":"2022-08-21T01:17:09.828Z","updatedAt":"2022-08-21T01:17:09.828Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"The Log Inn #NoDistractions","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UtYw39O5NVFy9H9y3vif0/48f65de64f4f2d0c69850f01004d0d96/nodistractions.png","details":{"size":1845522,"image":{"width":1560,"height":658}},"fileName":"nodistractions.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1e2NRzu2hqAHRDyq8xsC4Q","type":"Asset","createdAt":"2022-08-21T01:18:01.362Z","updatedAt":"2022-08-21T01:18:01.362Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"The Log Inn #NoDistractions","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1e2NRzu2hqAHRDyq8xsC4Q/a7efbb1aa9bbc7d9ab08adabd1fc96da/2021-LogInnNoDistractions.pdf","details":{"size":1686592},"fileName":"2021-LogInnNoDistractions.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Auth0","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6FkHqEzRiwIbujgSIbiQU2","type":"Entry","createdAt":"2022-08-21T01:23:35.950Z","updatedAt":"2022-08-21T01:23:35.950Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1","description":"Release of 5 chapters."}}],"language":"EN","ocid":"7014z000001cb8MAAQ-aPA4z0000000171GAA"},{"type":"ebooks","updatedAt":"2022-09-10T14:47:13.093Z","title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","id":"uk-public-sector-ciam-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"460ILZCPJCyHAIQa63IK4w","type":"Asset","createdAt":"2022-06-03T01:23:13.600Z","updatedAt":"2022-06-03T01:23:13.600Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/460ILZCPJCyHAIQa63IK4w/3dc52ea9938df4b770662a8874558c52/Whitepaper_Cover_A4__8_.jpeg","details":{"size":165123,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (8).jpeg","contentType":"image/jpeg"}}},"description":"Customer identity and access management (CIAM) helps public sector agencies achieve secure, seamless, frictionless interaction that builds trust with citizens. To assess trends in CIAM adoption in the United States (US), United Kingdom (UK), and Australia and New Zealand (ANZ), Auth0/Okta partnered with Market Connections to identify and quantify how government agencies at all levels are providing digital services. The study specifically looked at the current state of identity authentication and security; challenges to current implementation; current pain points; and plans and concerns about changing systems and processes. These data points highlight key findings.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"GBctZSeY2swBMouu0G6tk","type":"Asset","createdAt":"2022-06-03T01:23:34.017Z","updatedAt":"2022-06-03T01:23:34.017Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/GBctZSeY2swBMouu0G6tk/c15a8d483f269fc315949f78b6c56569/-Share_Asset-_Whitepaper__Horizontal___11_.jpeg","details":{"size":1190354,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal) (11).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5JBy2qW4p2zTiAiZpJooxp","type":"Asset","createdAt":"2022-06-03T01:23:58.920Z","updatedAt":"2022-06-03T01:23:58.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the UK","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5JBy2qW4p2zTiAiZpJooxp/db057cb89950b020d6ade68cc5bf5ee4/Auth0-UK-CIAM-Infographic.pdf","details":{"size":335496},"fileName":"Auth0-UK-CIAM-Infographic.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Secure, Frictionless Customer Identity and Access Management","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cbBAAAY-aPA4z000000017YGAQ"},{"type":"ebooks","updatedAt":"2022-09-10T14:46:55.077Z","title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","id":"anz-public-sector-ciam-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4v1MOhfIzaIu0ssrtzeUS5","type":"Asset","createdAt":"2022-06-03T01:17:07.164Z","updatedAt":"2022-06-03T01:17:07.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4v1MOhfIzaIu0ssrtzeUS5/00757a1c56c69126be74c92ab42b7bf1/Whitepaper_Cover_A4__7_.jpeg","details":{"size":122339,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (7).jpeg","contentType":"image/jpeg"}}},"description":"Customer identity and access management (CIAM) helps public sector agencies achieve secure, seamless, frictionless interaction that builds trust with citizens. To assess trends in CIAM adoption in the United States (US), United Kingdom (UK), and Australia and New Zealand (ANZ), Auth0/Okta partnered with Market Connections to identify and quantify how government agencies at all levels are providing digital services. The study specifically looked at the current state of identity authentication and security; challenges to current implementation; current pain points; and plans and concerns about changing systems and processes. These data points highlight key findings.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6phaZrPkhmoLEbeLLm7ma2","type":"Asset","createdAt":"2022-06-03T01:17:38.535Z","updatedAt":"2022-06-03T01:17:38.535Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6phaZrPkhmoLEbeLLm7ma2/9b4bc01ab8824b93d4f5c837a839d382/-Share_Asset-_Whitepaper__Horizontal___10_.jpeg","details":{"size":1035020,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal) (10).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6q0Nwvfcfy1o5ZZ1RofONy","type":"Asset","createdAt":"2022-06-03T01:18:00.469Z","updatedAt":"2022-06-03T01:18:00.469Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in ANZ","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6q0Nwvfcfy1o5ZZ1RofONy/120df83db6c072bc44dea9aec3d4b1d0/Auth0-ANZ-CIAM-Infographic.pdf","details":{"size":304932},"fileName":"Auth0-ANZ-CIAM-Infographic.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Secure, Frictionless Customer Identity and Access Management","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb8jAAA-aPA4z000000017XGAQ"},{"type":"ebooks","updatedAt":"2022-09-10T14:46:41.387Z","title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","id":"us-public-sector-ciam-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5YuUD1CIZ2rX0eIgLs1HHy","type":"Asset","createdAt":"2022-06-03T00:55:37.558Z","updatedAt":"2022-06-03T00:55:37.558Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5YuUD1CIZ2rX0eIgLs1HHy/16f412a127ddb8818f3fff1bf259e6d4/Whitepaper_Cover_A4__6_.jpeg","details":{"size":116680,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (6).jpeg","contentType":"image/jpeg"}}},"description":"Customer identity and access management (CIAM) helps public sector agencies achieve secure, seamless, frictionless interaction that builds trust with citizens. To assess trends in CIAM adoption in the United States (US), United Kingdom (UK), and Australia and New Zealand (ANZ), Auth0/Okta partnered with Market Connections to identify and quantify how government agencies at all levels are providing digital services. The study specifically looked at the current state of identity authentication and security; challenges to current implementation; current pain points; and plans and concerns about changing systems and processes. These data points highlight key findings.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"451TatY5jZi4hc6bSrLrhf","type":"Asset","createdAt":"2022-06-03T00:57:17.041Z","updatedAt":"2022-06-03T00:57:17.041Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/451TatY5jZi4hc6bSrLrhf/81660efdadd582e1c5350b21f44a3297/-Share_Asset-_Whitepaper__Horizontal___9_.jpeg","details":{"size":1013174,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Whitepaper (Horizontal) (9).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4O9R7J207Ha9cWgohYm66R","type":"Asset","createdAt":"2022-06-03T01:04:52.920Z","updatedAt":"2022-06-03T01:04:52.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Public Sector Infographic: Secure, Frictionless CIAM in the US","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4O9R7J207Ha9cWgohYm66R/51616adb19d1d8f66a92ecfacab27ec9/Auth0-US-CIAM-Infographic.pdf","details":{"size":316742},"fileName":"Auth0-US-CIAM-Infographic.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Secure, Frictionless Customer Identity and Access Management","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb8iAAA-aPA4z000000017WGAQ"},{"type":"ebooks","updatedAt":"2022-09-10T14:44:17.981Z","title":"Singpass and Auth0 Integration: Enable Singpass Login with a QR Code","id":"singpass-101","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vIluZLzSXEq8d9OjUyWIo","type":"Asset","createdAt":"2022-01-10T17:08:27.733Z","updatedAt":"2022-01-10T17:48:09.044Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 Integration with Singpass","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6vIluZLzSXEq8d9OjUyWIo/737d80c62cc9524985c24d6be9d49a1e/-Google_Docs-_Whitepaper__Letter_size_.jpeg","details":{"size":138387,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Whitepaper (Letter size).jpeg","contentType":"image/jpeg"}}},"description":"## Leverage Singapore’s national digital identity system for user authentication.\n\nSingpass, launched in 2003 as a government agency authentication service, is quickly gaining steam in Southeast Asia as a private-sector auth solution. Learn how to seamlessly integrate Singpass QR Login and Auth0 Universal Login using OIDC authorization code flow and Singpass’s embedded SDK. \n\nIn this eBook you’ll learn:\n- The Singpass SDK authorization flow using digital identifiers (UUID and NRIC)\n- How to configure the Singpass integration proxy within Auth0\n- Technical steps to deploy Singpass as a login option for your end-users","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2RDAmTi40HSvHVkWFYw5pQ","type":"Asset","createdAt":"2022-01-10T17:25:47.042Z","updatedAt":"2022-01-10T17:25:47.042Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Singpass and Auth0 Integration: Enable Singpass Login with a QR Code","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2RDAmTi40HSvHVkWFYw5pQ/23d7e12ee34e54b36c127f67b6c7204b/-Share_Asset-_Whitepaper__Horizontal___12_.jpeg","details":{"size":194594,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Whitepaper (Horizontal) (12).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2fDcrSxSaUUR0V056ovDXS","type":"Asset","createdAt":"2022-01-10T17:26:19.105Z","updatedAt":"2022-01-10T17:26:19.105Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Singpass and Auth0 Integration: Enable Singpass Login with a QR Code","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2fDcrSxSaUUR0V056ovDXS/ccdc9df9c872206660b8315f405ad10e/Auth0-eBook-Singpass-101.pdf","details":{"size":2929958},"fileName":"Auth0-eBook-Singpass-101.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- How Singpass QR Login Works\n- Integrate Singpass with Auth0\n- Technical details\n- Deploy Singpass with integration proxy\n- Universal login\n- How it looks in action\n- User profile","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","customCanonicalPath":"/blog/auth0-integration-with-singpass/","ocid":"7014z000001cb7aAAA-aPA4z000000015cGAA"},{"type":"ebooks","updatedAt":"2022-09-10T14:43:49.158Z","title":"Security for Web Developers","id":"security-for-web-developers","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1pdlP1HobarBZ6T6e6M5Ej","type":"Asset","createdAt":"2022-04-27T22:37:48.639Z","updatedAt":"2022-04-27T22:37:48.639Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Security for Web Developers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1pdlP1HobarBZ6T6e6M5Ej/d4dcf5001cc1f88f11054e50d4cddfb9/-Landing_Page-_Security_for_Web_Developers.jpeg","details":{"size":100093,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Security for Web Developers.jpeg","contentType":"image/jpeg"}}},"description":"Web security is a vast and constantly evolving topic, just like web technologies themselves. Among your duties as a professional web developer, you must be aware of the dangers to which the applications you create may be exposed and apply appropriate solutions to protect them.\n\nThis book will drive you through a hands-on exploration of a few of the most\nnotorious threats that can affect web applications. Reading it you will learn:\n- How Cross-Site Scripting (XSS) works and how you prevent it\n- The mechanics of Cross-Site Request Forgery (CSRF) attacks and how you can defend against them\n- How to prevent Clickjacking attacks\n- How to mitigate Third-Party assets security risks\n- How attackers can downgrade HTTPS connections to unencrypted HTTP traffic","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3sGuJA0XOtjkTZxCho4gtM","type":"Asset","createdAt":"2022-04-27T22:38:08.231Z","updatedAt":"2022-04-27T22:38:08.231Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Security for Web Developers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3sGuJA0XOtjkTZxCho4gtM/bd8152fd7b5d5c785d3099617df1c6f0/-Share_Asset-_Security_for_Web_Developers__Horizontal_.jpeg","details":{"size":719499,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Security for Web Developers (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"36vOOp6s7YXL2QQ9hFbSb9","type":"Asset","createdAt":"2022-04-27T22:38:43.987Z","updatedAt":"2022-05-18T17:37:59.855Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Security for Web Developers EBook - PDF version","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/36vOOp6s7YXL2QQ9hFbSb9/82840823661404f11e1f3b362be5ed7a/eBook-Security-for-Web-Developers.pdf","details":{"size":3748013},"fileName":"eBook-Security-for-Web-Developers.pdf","contentType":"application/pdf"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3zphobwp9zHrMBK5ep8YoI","type":"Asset","createdAt":"2022-05-18T17:37:37.988Z","updatedAt":"2022-05-18T17:37:52.175Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Security for Web Developers - ePub version","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3zphobwp9zHrMBK5ep8YoI/d66fea699ec5718efbcfa9eae5299cfa/Security_for_Web_Developers.epub","details":{"size":10122164},"fileName":"Security for Web Developers.epub","contentType":"application/epub+zip"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"zpHSo9DYixXJLIdB8xux9","type":"Entry","createdAt":"2022-04-27T22:35:23.150Z","updatedAt":"2022-04-27T22:35:23.150Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Andrea Chiarelli","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"yEaI6ZJiIoAFJAZKSvkkD","type":"Asset","createdAt":"2022-04-27T22:35:14.800Z","updatedAt":"2022-04-27T22:35:14.800Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Andrea Chiarelli","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/yEaI6ZJiIoAFJAZKSvkkD/5c139bf4c495c319b2c2fc4c2dc3b3ab/andrea-chiarelli.jpeg","details":{"size":23483,"image":{"width":400,"height":400}},"fileName":"andrea-chiarelli.jpeg","contentType":"image/jpeg"}}}}},"content":"1. Introduction\n2. Cross-site scripting\n3. Cross-site request forgery (CSRF)\n4. Clickjacking\n5. Third-party assets security risks\n6. HTTPS downgrade attacks\n7. Where to go next","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cbbDAAQ-aPA4z0000008OZcGAM"},{"type":"ebooks","updatedAt":"2022-09-10T14:43:32.037Z","title":"Infographic: Secure, Frictionless CIAM","id":"pubsec-secure-frictionless-ciam-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2UL1hTH5xoqnDhS3oi5QXa","type":"Asset","createdAt":"2022-05-11T23:14:39.765Z","updatedAt":"2022-05-11T23:14:39.765Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Secure, Frictionless CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2UL1hTH5xoqnDhS3oi5QXa/6060ba9f981309f1f630508914fe6064/Whitepaper_Cover_A4__1_.jpeg","details":{"size":69379,"image":{"width":600,"height":856}},"fileName":"Whitepaper_Cover_A4 (1).jpeg","contentType":"image/jpeg"}}},"description":"A companion piece to our [Secure, Frictionless CIAM Whitepaper](https://auth0.com/resources/whitepapers/pubsec-secure-frictionless-ciam), this infographic highlights the current state of IAM in the public sector, surprising statistics, and important aspects to consider when implementing Customer Identity and Access Management solutions","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"LuwtSsE6ltDsVFnFSnvHW","type":"Asset","createdAt":"2022-05-11T23:14:57.755Z","updatedAt":"2022-05-11T23:14:57.755Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Secure, Frictionless CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/LuwtSsE6ltDsVFnFSnvHW/9ddf6e0b9450ffcf52d5da0ae36c4262/Whitepaper__Digital_Trans__1250x608px__1_.jpeg","details":{"size":110051,"image":{"width":1250,"height":608}},"fileName":"Whitepaper_(Digital_Trans)_1250x608px (1).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7Ea1AW37gTOqluLjFGd5kA","type":"Asset","createdAt":"2022-05-11T23:15:30.546Z","updatedAt":"2022-05-11T23:15:30.546Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Secure, Frictionless CIAM","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7Ea1AW37gTOqluLjFGd5kA/451d95a886090d67552f1badb672c1c1/Infographic-Secure-Frictionless-CIAM.pdf","details":{"size":282632},"fileName":"Infographic-Secure-Frictionless-CIAM.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- Current State of Digitizing Citizen Services\n- How to Free up Resources\n- Important Aspects of Implementing Single IAM System\n- Username and Password Still Leading Authentication Method for Digital Applications and Services","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb8CAAQ-aPA4z0000000163GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:59.859Z","title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","id":"building-a-secure-e-diary","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5pCddbL4kedY1HUyv5Tqwe","type":"Asset","createdAt":"2022-02-01T23:13:23.479Z","updatedAt":"2022-02-01T23:13:23.479Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5pCddbL4kedY1HUyv5Tqwe/788b113e71ac564246cf4fa24a4a9c79/Fauna___Netlify_eBook_Share_Asset_V2.jpg","details":{"size":89369,"image":{"width":600,"height":856}},"fileName":"Fauna + Netlify eBook Share Asset V2.jpg","contentType":"image/jpeg"}}},"description":"## A practical insight into role-based authorization with Fauna, Netlify, and Auth0\n\nThis eBook is a practical guide on how to utilize Auth0’s enhanced security features in building modern web applications and seamlessly integrate them with other serverless solutions like Fauna, and Netlify. The guide focuses more on how to integrate Fauna and Netlify with Auth0 in building a secure online E-diary.\n\nAt the end of this article, readers will be able to:\n- Create and configure a simple application on Auth0.\n- Setup a Fauna database and configure it to support Auth0 as a security provider.\n- Build a simple web application that uses both Auth0 and Fauna to function seamlessly.\n- Deploy the web platform using Netlify and Heroku.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1j78iIMTB6zsFC00pVcML9","type":"Asset","createdAt":"2022-02-01T23:14:03.477Z","updatedAt":"2022-02-01T23:14:03.477Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1j78iIMTB6zsFC00pVcML9/739f469a7460fdaf90585f01793e4ccd/Fauna___Netlify_eBook_Banner_v2.jpeg","details":{"size":1189967,"image":{"width":5000,"height":2432}},"fileName":"Fauna + Netlify eBook Banner v2.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1XcRMMxNC4KC8qyAgUlWbk","type":"Asset","createdAt":"2022-02-01T23:14:21.835Z","updatedAt":"2022-02-01T23:15:25.924Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Building A Secure E-diary Using Fauna, Netlify, and Auth0","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1XcRMMxNC4KC8qyAgUlWbk/6b710d9bd927d333df757337a523cad4/eBook-Auth0-Fauna-Netlify-updated-2022-02.pdf","details":{"size":1695387},"fileName":"eBook-Auth0-Fauna-Netlify-updated-2022-02.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"The guide focuses more on how to integrate Fauna and Netlify with Auth0 in building a secure online E-diary.","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb7WAAQ-aPA4z000000015WGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:56.694Z","title":"Infographic: State of Healthcare’s Digital Front Door","id":"state-of-healthcare-digital-front-door-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"vJSnSMdmfGS8IbrOWHrk4","type":"Asset","createdAt":"2021-12-13T22:20:30.382Z","updatedAt":"2021-12-13T22:20:30.382Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: State of Healthcare’s Digital Front Door","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/vJSnSMdmfGS8IbrOWHrk4/c98d5c8e4a5de5eb4665f386d116e4ef/DFD_Infographic_Cover_LP.jpeg","details":{"size":90140,"image":{"width":600,"height":856}},"fileName":"DFD Infographic Cover_LP.jpeg","contentType":"image/jpeg"}}},"description":"With healthcare organizations advancing virtual care investments to address patients' desires for convenient access to care, ensuring seamless access has become increasingly essential to drive better engagement and care outcomes. \n\nIn healthcare, the Digital Front Door is meant to address this, acting as a single hub or wrap-around experience through which all interactions can occur whether that's an e-referral, symptom assessment, virtual care or remote monitoring. \n\nThis infographic details key identity and access management considerations when building or advancing Digital Front Door strategies.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UpO6gJUYimyVpFDwL7DlA","type":"Asset","createdAt":"2021-12-13T22:22:12.114Z","updatedAt":"2021-12-13T22:22:12.114Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: State of Healthcare’s Digital Front Door","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UpO6gJUYimyVpFDwL7DlA/eb8ad7fa45b6ccd1b30b66ee0ea3deb5/DFD_Infographic_Shared_asset.jpeg","details":{"size":706076,"image":{"width":5000,"height":2432}},"fileName":"DFD Infographic Shared asset.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"n7S3iqSzxwjnJmRxb2223","type":"Asset","createdAt":"2021-12-13T22:22:28.265Z","updatedAt":"2021-12-13T22:22:28.265Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: State of Healthcare’s Digital Front Door","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/n7S3iqSzxwjnJmRxb2223/e4735354606f9633e9f3dc9b5758158e/Auth0_Digital_Front_Door_Infographic.pdf","details":{"size":719091},"fileName":"Auth0 Digital Front Door Infographic.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Infographic: State of Healthcare’s Digital Front Door","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb6uAAA-aPA4z0000000159GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:55.937Z","title":"Authentication After Passwords","id":"authentication-after-passwords","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6GhFWQMeMGfwGyev2gZtkf","type":"Asset","createdAt":"2021-12-09T00:09:50.485Z","updatedAt":"2021-12-09T00:09:50.485Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication After Passwords","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6GhFWQMeMGfwGyev2gZtkf/918ecffc22566bea647de34e61bb8f74/Screen_Shot_2021-12-08_at_4.01.12_PM.png","details":{"size":152589,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-12-08 at 4.01.12 PM.png","contentType":"image/png"}}},"description":"From improving customer experience through seamless single sign-on (SSO) to making multi-factor authentication (MFA) quick and easy, your login box must find the right balance between user convenience, security, and privacy. \n\nIn fact, we believe that the companies that will succeed in the next five years will be the ones best-equipped to meet the ever-growing consumer expectations for these three attributes. But what will that future look like, and by what path can today’s companies become tomorrow’s leaders?\n\nIn this ebook, we will answer these questions and take a closer look at the future of authentication, and the impacts of passwordless.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5C4SYNq3PES3SHvSkq3xa5","type":"Asset","createdAt":"2021-12-09T00:18:01.860Z","updatedAt":"2021-12-09T00:18:01.860Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication After Passwords","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5C4SYNq3PES3SHvSkq3xa5/b66ed35c5ee5b41de7e834eba1a35d0a/-Share_Asset-_Guide__Horizontal___4_.jpeg","details":{"size":135596,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Guide (Horizontal) (4).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3cljUOX6YkVU767WNyqqrR","type":"Asset","createdAt":"2021-12-09T00:18:27.679Z","updatedAt":"2021-12-09T00:18:27.679Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication After Passwords","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3cljUOX6YkVU767WNyqqrR/27d0c6e011a8ea7ddf19e2950b67e465/Auth0-eBook-Authentication-After-Passwords.pdf","details":{"size":724768},"fileName":"Auth0-eBook-Authentication-After-Passwords.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- Introduction\n- The future of identity\n- The frictionless imperative\n- Identity flows are fundamental elements of the customer journey\n- First things first: passwordless authentication\n- The loginless roadmap\n- What you can do now\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb73AAA-aPA4z000000015HGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:44.951Z","title":"Customer Identity \u0026 Access Management For Dummies","id":"ciam-for-dummies","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1tA41Kmr2ZA5buYUXGW95b","type":"Asset","createdAt":"2021-09-29T15:48:42.768Z","updatedAt":"2021-10-20T09:09:45.207Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":4,"locale":"en-US"},"fields":{"title":"CIAM for Dummies","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1tA41Kmr2ZA5buYUXGW95b/237c6bb7fb85176bb5e76df5d52ee5a7/Okta_CIAM_Auth0_WH200_UK.png","details":{"size":179042,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_UK.png","contentType":"image/png"}}},"description":"Usernames and passwords have become a part of everyday life. Consumers manage different accounts for online shopping, bank accounts, and mobile apps. This is customer identity and access management (CIAM), and you no doubt recognize some of the differences between good CIAM and bad CIAM in many of your digital experiences. For example, your mobile banking app may give you a strong sense of security and ease of use by simply authenticating you with a fingerprint or face scan. On the other hand, you’ve likely abandoned more than one online shopping cart when a retailer wants you to complete a lengthy registration process. Registration can take more time than finding the products you were looking for!\n\nDownload your free guide and find out:\n- What CIAM is and why it matters\n- What capabilities and features to look for in a modern CIAM solution\n- Ten steps to implementing the right CIAM solution for your business","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2DN6A7UDGUg4Jv30Fz7Xi9","type":"Asset","createdAt":"2021-09-29T15:51:59.514Z","updatedAt":"2021-10-20T09:10:24.908Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":3,"locale":"en-US"},"fields":{"title":"CIAM for Dummies","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2DN6A7UDGUg4Jv30Fz7Xi9/3e3028a0ff941b2afca2eae1f0237d91/_Share_Asset__CIAM_for_dummies__EN__Guide__Horizontal_.png","details":{"size":91101,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] CIAM for dummies (EN) Guide (Horizontal).png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1EsJzeNpj8el2wgLSMlH4B","type":"Asset","createdAt":"2021-09-29T15:52:27.842Z","updatedAt":"2021-10-20T09:11:38.621Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"locale":"en-US"},"fields":{"title":"CIAM for Dummies","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1EsJzeNpj8el2wgLSMlH4B/7c043afd110c56bd8abda3f78c9a1a8b/CIAM_for_Dummies.pdf","details":{"size":2613349},"fileName":"CIAM for Dummies.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Download this free guide to find out:\n- What CIAM is and why it matters\n- What capabilities and features to look for in a modern CIAM solution\n- Ten steps to implementing the right CIAM solution for your business","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb7dAAA-aPA4z000000015iGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:44.656Z","title":"Identity as a Service for Dummies","id":"identity-as-a-service-for-dummies","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"71b4geBxjNbxuUmlG6g2Mb","type":"Asset","createdAt":"2021-09-23T14:53:47.889Z","updatedAt":"2021-09-23T14:53:47.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS for Dummies Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/71b4geBxjNbxuUmlG6g2Mb/37b649c75f1ea650803543d2ad9d584e/Okta_IDaaS_Auth0_WH200_UK.png","details":{"size":174740,"image":{"width":600,"height":856}},"fileName":"Okta_IDaaS_Auth0_WH200_UK.png","contentType":"image/png"}}},"description":"Identity as a Service (IDaaS) solutions enable your organisation to bolster security and manage identity and access with speed and confidence. To leverage IAM services and security at scale, many organisations are adopting modern identity from the cloud. In this book, you’ll learn what modern identity is all about and how IDaaS can help your enterprise. Get a sneak peek at what’s inside:\n- Chapter 1: The importance of identity, what it is, and how it has evolved\n- Chapter 2: What modern identity (Identity as a Service) is and how it helps organizations\n- Chapter 3: The components of modern identity\n- Chapter 4: New trends and innovations to address the future of identity\n- Chapter 5: Key capabilities and benefits of modern identity","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6d1nZcC9NaisTLh5g1DkXE","type":"Asset","createdAt":"2021-09-23T14:55:03.124Z","updatedAt":"2021-09-23T17:57:19.226Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"IDaaS for Dummies","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6d1nZcC9NaisTLh5g1DkXE/17a446b50aa6db112f4ed847b6b1865c/idaas-for-dummies-en-share-asset.jpeg","details":{"size":126917,"image":{"width":1250,"height":608}},"fileName":"idaas-for-dummies-en-share-asset.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7pC3PWfDt0rUtZsLbyP0f0","type":"Asset","createdAt":"2021-09-23T14:56:07.000Z","updatedAt":"2021-09-23T14:56:07.000Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS for Dummies","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7pC3PWfDt0rUtZsLbyP0f0/55cec2425b08c83465b743dfca178c96/Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-English.pdf","details":{"size":2589966},"fileName":"Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-English.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Chapter 1: The importance of identity, what it is, and how it has evolved\nChapter 2: What modern identity (Identity as a Service) is and how it helps organizations\nChapter 3: The components of modern identity\nChapter 4: New trends and innovations to address the future of identity\nChapter 5: Key capabilities and benefits of modern identity","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb6MAAQ-aPA4z0000000147GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:12:43.209Z","title":"Infographic: Top 3 Attacks That Threaten Identity Security","id":"top-3-attacks-that-threaten-identity-security-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3NmZtNbG3f1QypWsbWibxM","type":"Asset","createdAt":"2021-06-24T22:49:29.865Z","updatedAt":"2021-06-28T20:52:24.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Infographic: Top 3 Attacks That Threaten Identity Security","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3NmZtNbG3f1QypWsbWibxM/89d3e91be99b0c749dbccfa7f3cb5105/Identity_Security_Infographic_-_Landing_Page__Updated_.jpeg","details":{"size":85802,"image":{"width":600,"height":856}},"fileName":"Identity Security Infographic - Landing Page (Updated).jpeg","contentType":"image/jpeg"}}},"description":"Released as part of Auth0's inaugural [State of Secure Identity report](https://auth0.com/resources/whitepapers/state-of-security-identity-report), this infographic reveals the top 3 attacks that threaten identity security. \n\nReleased in June, 2021, the Auth0 State of Secure Identity Report reveals insights from our own trends and analysis to help define the identity security space, clarify emerging threats, and provide concrete strategies for mitigation. \n\nFor a more in-depth analysis, read the full-length [State of Secure Identity report](https://auth0.com/resources/whitepapers/state-of-security-identity-report) to learn about:\n- Credential stuffing\n- Injection attacks\n- Fake account creation\n- MFA bypass attacks\n- What defensive measures are being adopted to combat these attacks","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"15gqbcOHQVlcenh7xr5r7F","type":"Asset","createdAt":"2021-06-24T21:57:12.872Z","updatedAt":"2021-06-24T21:57:12.872Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Top 3 Attacks That Threaten Identity Security","file":{"url":"//images.ctfassets.net/2ntc334xpx65/15gqbcOHQVlcenh7xr5r7F/21a0cc37b69d48744492a9f3f2dedf43/Identity_Security_Infographic_-_Share_Asset.png","details":{"size":519148,"image":{"width":1250,"height":608}},"fileName":"Identity Security Infographic - Share Asset.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4DcsGdI2GQ8zTru57e4Kq9","type":"Asset","createdAt":"2021-06-24T21:57:58.481Z","updatedAt":"2021-06-24T21:57:58.481Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Top 3 Attacks That Threaten Identity Security","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/4DcsGdI2GQ8zTru57e4Kq9/96e8c7ddd45c30f1faec78991a528ff5/Identity_Security_Infographic_Top_3_Attacks_That_Threaten_Identity_Security.pdf","details":{"size":46093813},"fileName":"Identity_Security_Infographic_Top_3_Attacks_That_Threaten_Identity_Security.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"The State of Secure Identity 2021: Top 3 Attacks That Threaten Identity Security","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","ocid":"7014z000001cb85AAA-aPA4z000000015rGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:11:48.125Z","title":"Security in the Cloud: Identity \u0026 Access Management \u0026 Mitigating Risk","id":"auth0-iam-cloudsecurity-ebook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4LMNGwhPK0sEfb3p6oqCBF","type":"Asset","createdAt":"2021-02-12T17:27:43.837Z","updatedAt":"2021-02-12T17:36:52.085Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0AWS CloudSecurity eBook Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4LMNGwhPK0sEfb3p6oqCBF/bb1970ec12774dd8a1d0cda77b0ebc0a/Auth0AWS_CloudSecurity_eBook_Cover.png","details":{"size":122663,"image":{"width":600,"height":856}},"fileName":"Auth0AWS CloudSecurity eBook Cover.png","contentType":"image/png"}}},"description":"Research reveals that 79% of organisations have experienced an identity-related security breach in the last two years. Given the rapid rise in remote working and business migration to cloud-based apps, this is only a problem that is going to get worse. For organisations to meet the growing demands of cloud-based computing, they will need to ensure they have a robust, scalable IAM solution. This eBook discusses why identity-as-a-service is key to managing the challenges of secure access and frictionless digital experiences.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"M1z5bhG5l7HNNxm3ZG6sE","type":"Asset","createdAt":"2021-02-12T17:28:08.631Z","updatedAt":"2021-02-12T17:28:08.631Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"AWS+Auth0 eBook Image 3","file":{"url":"//images.ctfassets.net/2ntc334xpx65/M1z5bhG5l7HNNxm3ZG6sE/553baa214878f9a24f6e4147ff780625/AWS_Auth0_eBook_Image_3.png","details":{"size":1941012,"image":{"width":5000,"height":2432}},"fileName":"AWS+Auth0 eBook Image 3.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"19q5aXPMOnzMc1Qv7mEfPD","type":"Asset","createdAt":"2021-02-12T17:31:21.385Z","updatedAt":"2021-02-12T17:31:21.385Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0AWS-CloudSecurity-eBook-FINAL","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/19q5aXPMOnzMc1Qv7mEfPD/e78c891d6cb7c059038c503d65c9e68a/Auth0AWS-CloudSecurity-eBook-FINAL.pdf","details":{"size":2562783},"fileName":"Auth0AWS-CloudSecurity-eBook-FINAL.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1BccjhaojlJo7AQCP87mkO","type":"Entry","createdAt":"2020-09-10T23:22:09.990Z","updatedAt":"2020-09-21T19:02:45.067Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0 \u0026 AWS","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6xbidsxD0WPbO8P5bcr5Xx","type":"Asset","createdAt":"2020-09-10T23:22:04.247Z","updatedAt":"2020-09-21T19:02:44.914Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"locale":"en-US"},"fields":{"title":"AWS and Auth0 logo lock up","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6xbidsxD0WPbO8P5bcr5Xx/009a7a9474d1e3e666e50a2587b8857b/AWS_and_Auth0_logo_lock_up.png","details":{"size":33347,"image":{"width":460,"height":474}},"fileName":"AWS and Auth0 logo lock up.png","contentType":"image/png"}}}}},"content":"Auth0 \u0026 AWS","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1jNLaXSK8gaM7Qvscs2Kf2","type":"Entry","createdAt":"2020-03-10T14:59:23.532Z","updatedAt":"2020-03-10T14:59:23.532Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"0.1","description":"Initial release that contains the first three chapters."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2S2L60Z4APqL2iEKnRJW5l","type":"Asset","createdAt":"2021-02-11T16:27:15.872Z","updatedAt":"2021-02-11T16:27:15.872Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Guía del Comprador de CIAM","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2S2L60Z4APqL2iEKnRJW5l/018e3c816cc4a68a54e83395ec83bed7/CIAM-Buyers-Guide-Spanish-Thumbnail.png","details":{"size":108328,"image":{"width":428,"height":428}},"fileName":"CIAM-Buyers-Guide-Spanish-Thumbnail.png","contentType":"image/png"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZDoZYSpQAIW5K3Zt53pnz","type":"Asset","createdAt":"2021-02-11T21:14:50.931Z","updatedAt":"2021-02-11T21:14:50.931Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Cómo Solucionar una Autenticación Vulnerada","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ZDoZYSpQAIW5K3Zt53pnz/95e010cab4eab128a3e8f4ff773c916c/Fixing-Broken-Authentication-Spanish-Thumbnail.png","details":{"size":108328,"image":{"width":428,"height":428}},"fileName":"Fixing-Broken-Authentication-Spanish-Thumbnail.png","contentType":"image/png"}}},"ocid":"7014z000001cb4fAAA-aPA4z0000000131GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:10:03.988Z","title":"Why AWS + Auth0","id":"aws-auth0-ebook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6JYoTcya84dGUpFMbjs8Bx","type":"Asset","createdAt":"2019-11-11T22:18:00.850Z","updatedAt":"2019-11-11T22:18:00.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"locale":"en-US"},"fields":{"title":"Why AWS + Auth0 ","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6JYoTcya84dGUpFMbjs8Bx/32d3727d598ebc2d7b951fa7f29ea897/WHY_AWS.png","details":{"size":395170,"image":{"width":600,"height":856}},"fileName":"WHY AWS.png","contentType":"image/png"}}},"description":"This eBook explores how Auth0 and AWS work together to ensure that AWS customers can have the quick, easily implemented identity solution they need for their specific application.\n\nDownload to learn about:\n\n- How to get ready to have your identity wired and running in minutes\n- Advanced security architectural considerations\n- Configuring Auth0 for API Gateway with custom Authorizers","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"cB2Jp9dNkAzeWJH7Vdn2H","type":"Asset","createdAt":"2019-11-11T17:03:04.365Z","updatedAt":"2019-11-11T17:03:04.365Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"locale":"en-US"},"fields":{"title":"Why AWS + Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/cB2Jp9dNkAzeWJH7Vdn2H/662fcf54300d526f84573da51a9d853a/TC_why-aws-auth0.png","details":{"size":1213676,"image":{"width":2400,"height":1260}},"fileName":"TC_why-aws-auth0.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"57svSdnx07lHKIjdyzhDVL","type":"Asset","createdAt":"2019-11-13T17:59:57.246Z","updatedAt":"2019-11-13T17:59:57.246Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":1,"locale":"en-US"},"fields":{"title":"Why AWS + Auth0 - eBook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/57svSdnx07lHKIjdyzhDVL/ccb7df4cced46b84556039d57f3d1b87/20191112_Why-AWS-Auth0__1___1_.pdf","details":{"size":4822744},"fileName":"20191112_Why-AWS-Auth0 (1) (1).pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"## Contents\n\n1. Introduction \n\n2. Architected with Security in Mind \n 1. Advanced Security Architecture - Built-in\n 2. Roadmap input, early emerging threat detection\n \n3. AWS Increases Security Scan Freedom \n 1. What This New Policy Means for Security Teams\n 2. What We Are Doing at Auth0\n 3. Moving From Manual to Automated\n \n4. How to set up an AWS/API gateway\n 1. How API Gateway Custom Authorizers Work \n 2. Before you Begin \n 3. Step 1 - Configure Auth0\n 4. Step 2 - Import and Deploy the Gateway API\n 5. Step 3 - Create the Custom Authorizers\n 6. Step 4 - Secure the API Using Custom Authorizers\n \n5. Additional Resources \n6. Best Practices \u0026 project planning \n7. Questions? ","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4fh0COZzI0CsXEnTHotWxh","type":"Asset","createdAt":"2020-10-13T22:52:34.765Z","updatedAt":"2020-10-13T22:52:34.765Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"AWS + Hands","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4fh0COZzI0CsXEnTHotWxh/ad77511ae6749461a0ea6d21db86faf0/aws_thumb.jpg","details":{"size":32011,"image":{"width":581,"height":388}},"fileName":"aws_thumb.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The #AWS+Auth0 eBook — Learn how #AWS \u0026 @Auth0 work together to ensure customers have quick, easily implemented identity solutions for their applications: https://auth0.com/resources/ebooks/aws-auth0-ebook","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6JYoTcya84dGUpFMbjs8Bx","type":"Asset","createdAt":"2019-11-11T22:18:00.850Z","updatedAt":"2019-11-11T22:18:00.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"locale":"en-US"},"fields":{"title":"Why AWS + Auth0 ","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6JYoTcya84dGUpFMbjs8Bx/32d3727d598ebc2d7b951fa7f29ea897/WHY_AWS.png","details":{"size":395170,"image":{"width":600,"height":856}},"fileName":"WHY AWS.png","contentType":"image/png"}}},"ocid":"7014z000001cb21AAA-aPA4z000000011eGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:10:03.675Z","title":"#nodistractions: an eBook","id":"no-distractions-ebook-2020","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ZKerRuBi0Tui0yuYwvAvy","type":"Asset","createdAt":"2020-02-10T21:20:32.136Z","updatedAt":"2020-02-11T00:09:16.660Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":2,"locale":"en-US"},"fields":{"title":"No_Distractions_Cover_Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ZKerRuBi0Tui0yuYwvAvy/774778fde86b0a67dd9cdcd1ee36101c/CoverImage.jpeg","details":{"size":67253,"image":{"width":600,"height":856}},"fileName":"CoverImage.jpeg","contentType":"image/jpeg"}}},"description":"How does a company create a common product, and become a market leader? How does a retailer open thousands of stores, in multiple countries, during the high street crisis? How does a utility provider thrive in a crowded energy market?\n\nThis ebook discusses some of the factors that sees businesses align their strategy with their technical development, making it easier to:\n\n- Centralize systems\n- Eliminate technical debt and mitigate risk\n- Bring innovations in their products, applications and services to market, faster\n\n\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5WI28GOFCP99qy88yqIvC1","type":"Asset","createdAt":"2020-02-10T21:20:47.542Z","updatedAt":"2020-02-11T00:08:47.064Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":2,"locale":"en-US"},"fields":{"title":"No Distractions eBook Twitter Card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5WI28GOFCP99qy88yqIvC1/5443fd76477efe8bb3a0601c076760fe/Twitter_Card.jpeg","details":{"size":219391,"image":{"width":2400,"height":1260}},"fileName":"Twitter Card.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3bZzpyHPd9IqxGsDPXbkC0","type":"Asset","createdAt":"2020-04-23T13:52:01.444Z","updatedAt":"2020-04-23T14:10:40.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":82,"revision":2,"locale":"en-US"},"fields":{"title":"nodistractions_eBook","description":"An updated version of the #nodistractions eBook, with the removed customer quotes","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3bZzpyHPd9IqxGsDPXbkC0/1e734a544472dc72c95dec79de9259a8/No_Distractions_Final.pdf","details":{"size":983210},"fileName":"No_Distractions_Final.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pCwC3LOGQT9FyZBHGJl73","type":"Entry","createdAt":"2019-11-21T23:54:50.459Z","updatedAt":"2019-11-21T23:54:50.459Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Jenny O'Brien","job_title":"Business Content Manager","twitter":"https://twitter.com/jenny_obrien","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1KpSm398RTsdbJzLoNzfvS","type":"Asset","createdAt":"2020-02-11T14:24:03.334Z","updatedAt":"2020-02-11T14:24:03.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"Jenny O'Brien","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1KpSm398RTsdbJzLoNzfvS/fd43cecb25001ba16e3daccf5f95d6f9/88sTtRBT_400x400.png","details":{"size":321409,"image":{"width":400,"height":400}},"fileName":"88sTtRBT_400x400.png","contentType":"image/png"}}},"bio":"I'm a former business journalist who's fascinated by the intersection of tech and business strategy — in particular how the right solution can transform an idea into reality. I specialize in ROI, data privacy, and identity."}},"content":"# Contents\t\n\n__1 Innovation__\n1.1 Recognized for Solving Different Needs\t\n1.2 Decreasing Project Risk\t\n1.3 Supporting (and Providing) Continual Innovation\t\n1.4 Collaboration Brings Success\t\n\n__2 Time to Market__\n2.1 Beat the POC Waiting Game\t\n2.2 How Fast is Implementation?\t\n2.3 The Benefit of Focus\t\n\n__3 Security__\n3.1 Decreasing Project Risk\t\n3.2 Proving Trust with Accreditation\t\n3.3 Getting the ‘Jump’ on Fraudulent Users\t\n3.4 Security ROI\t\n\n__4 Maintenance__\t\n4.1 Can You Keep up Your Own Success?\t\n4.2 Will Your Innovations Have to Wait?\t\n4.3 Can You Scale with Ease — and Speed?\t\n4.4 Where’s Your Focus?\n\n__5 What’s the Real ROI of going with a service like Auth0?__\t\n5.1 Recognition\t\n5.2 Future-Proofing\t\n5.3 Peace of Mind\t\n5.4 The Best Offering\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6EV6dPGAQu3IZOTTAqPoEp","type":"Entry","createdAt":"2020-02-10T21:21:09.736Z","updatedAt":"2021-10-21T16:10:03.220Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Cr9CZ92pRYBvmXQYtR7Cb","type":"Asset","createdAt":"2020-10-13T22:48:24.145Z","updatedAt":"2020-10-13T22:48:24.145Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"No distractions","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5Cr9CZ92pRYBvmXQYtR7Cb/3fa4d7e7206c11a0d4640e9453148cc6/no_distractions_thumb.jpg","details":{"size":32565,"image":{"width":581,"height":388}},"fileName":"no_distractions_thumb.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"480zQQCyI1y5KDhbN0PrQp","type":"Asset","createdAt":"2020-02-10T21:22:11.515Z","updatedAt":"2020-02-10T21:22:11.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"No Distractions Cover Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/480zQQCyI1y5KDhbN0PrQp/a06d3243499836b6ce12fc7523cb59c9/CoverImage.jpeg","details":{"size":990754,"image":{"width":2501,"height":3567}},"fileName":"CoverImage.jpeg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb28AAA-aPA4z000000011mGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:52.387Z","title":"The Enterprise Architect Cookbook","id":"the-enterprise-architect-cookbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XLoTNhrVCX8Na0JABPy3g","type":"Asset","createdAt":"2019-11-05T01:32:03.363Z","updatedAt":"2019-11-05T01:32:03.363Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Cover Auth0 Enterprise Architect Cookbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4XLoTNhrVCX8Na0JABPy3g/60da648ce335f8cd17cbd83db2e85fb4/Cover_Auth0_Enterprise_Architect_Cookbook_1x.png","details":{"size":236216,"image":{"width":600,"height":856}},"fileName":"Cover_Auth0 Enterprise Architect Cookbook@1x.png","contentType":"image/png"}}},"description":"Looking for best practices on how to maximize your Auth0 B2B or B2C implementation? You’ve come to the right place. This eBook is grounded in real-world customer implementations from Auth0 Professional Services offering you valuable assets wherever you are in your project journey.\n\nInside, you’ll find:\n\n- A delivery approach for B2C or B2B projects with Auth0\n- Focuses on what to do and why to do it\n- Guidance on how to approach your design and implementation approach with implementation checklists\n- Phased delivery mapped to milestones and feature areas\n- Acts as a guide to Auth0’s existing documentation\n- Links to evolving resources","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4hZ7O71tmhyLIx3U7cPKTc","type":"Asset","createdAt":"2019-11-04T18:00:22.587Z","updatedAt":"2019-11-06T11:20:11.095Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"Enterprise Architect Cookbook - Twitter Card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4hZ7O71tmhyLIx3U7cPKTc/1bf47b29774613472a2c6fb80bb1b3c1/noname__1_","details":{"size":996455,"image":{"width":2400,"height":1260}},"fileName":"noname (1)","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3er7e8GQ9jvZ2ljXIvuGAs","type":"Asset","createdAt":"2019-11-06T13:46:38.574Z","updatedAt":"2019-11-06T13:46:38.574Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The-Enterprise-Architect-Cookbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3er7e8GQ9jvZ2ljXIvuGAs/20e16db8178e104c6013f3524f5fecd1/The-Enterprise-Architect-Cookbook.pdf","details":{"size":442651},"fileName":"The-Enterprise-Architect-Cookbook.pdf","contentType":"application/pdf"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3GCtujca6d7sn4Fy6T6Y1V","type":"Asset","createdAt":"2019-11-06T13:46:53.571Z","updatedAt":"2019-11-06T13:46:53.571Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The-Enterprise-Architect-Cookbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3GCtujca6d7sn4Fy6T6Y1V/d2505aa0a16015d77b3903df49a9626b/The-Enterprise-Architect-Cookbook.mobi","details":{"size":194794},"fileName":"The-Enterprise-Architect-Cookbook.mobi","contentType":"application/octet-stream"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4MPlYCST3fm3hK236kpljU","type":"Asset","createdAt":"2019-11-06T13:47:03.811Z","updatedAt":"2019-11-06T13:47:03.811Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The-Enterprise-Architect-Cookbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4MPlYCST3fm3hK236kpljU/74882c9431ecfc2df34e01f966141def/The-Enterprise-Architect-Cookbook.epub","details":{"size":134390},"fileName":"The-Enterprise-Architect-Cookbook.epub","contentType":"application/epub+zip"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5uj0akIPMqNUCI5N3xpI6B","type":"Entry","createdAt":"2019-11-06T13:51:43.802Z","updatedAt":"2021-03-30T08:16:58.815Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0 + AWS","twitter":"https://twitter.com/auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13jXtxu7svY0l7YEMraNOr","type":"Asset","createdAt":"2021-03-29T19:29:26.090Z","updatedAt":"2021-03-29T19:29:26.090Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0+AWS","file":{"url":"//images.ctfassets.net/2ntc334xpx65/13jXtxu7svY0l7YEMraNOr/eda7f30bf6ef67ce36e192eb4f2a45fb/Auth0_AWS.png","details":{"size":70755,"image":{"width":420,"height":420}},"fileName":"Auth0+AWS.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"## Contents\n1. CIAM/B2C Planning Guide\n 1. Introduction\n 2. Phase 1: Application integration and User Authentication\n 3. Phase 2: API Authorization and advanced Authentication, Provisioning and Profile Management\n 4. Phase 3: Extended use cases for Authentication, Profile Management and Operations support\n\n2. B2B Planning Guide\n 1. Phase 1: Application integration and User Authentication\n 2. Phase 2: API Authorization and advanced Authentication, Provisioning and Profile Management\n 3. Phase 3: Extended use cases for Authentication, Profile Management and Operations support\n 4. Resources\n\n3. Resources","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ZdiGE6z1EwfHbZUz5nscO","type":"Entry","createdAt":"2019-11-04T18:20:53.762Z","updatedAt":"2019-11-06T14:41:50.712Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First release"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5P7U5FJtgX45aJvJ39MqFs","type":"Asset","createdAt":"2020-09-29T18:24:14.209Z","updatedAt":"2020-09-29T18:24:14.209Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 + Computerwoche","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5P7U5FJtgX45aJvJ39MqFs/e6c75be44a09e13b97fcf5950039d3c3/resource_thumb_62.jpg","details":{"size":46744,"image":{"width":581,"height":388}},"fileName":"resource_thumb_62.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The #EnterpriseArchitect CookBook 👩‍🍳📙 — a best practices guide to planning \u0026 implementing an @Auth0 solution. Check it out! https://auth0.com/resources/ebooks/the-enterprise-architect-cookbook","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2TrOJY2fv66ai9LuDuiLBq","type":"Asset","createdAt":"2019-11-04T17:59:41.856Z","updatedAt":"2019-11-06T11:20:11.687Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":2,"locale":"en-US"},"fields":{"title":"Enterprise Architect Cookbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2TrOJY2fv66ai9LuDuiLBq/28c37379c0c6b6f0b44ad046cf99d298/Auth0_Enterprise_Architect_Cookbook","details":{"size":781785,"image":{"width":1200,"height":1712}},"fileName":"Auth0 Enterprise Architect Cookbook","contentType":"image/png"}}},"ocid":"7014z000001cb1xAAA-aPA4z000000011aGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:51.593Z","title":"The OpenID Connect Handbook","id":"the-openid-connect-handbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"TZ4sO8yUbKdkf4ZWh5qPd","type":"Asset","createdAt":"2019-08-30T04:58:14.753Z","updatedAt":"2019-11-06T11:20:36.287Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":31,"revision":5,"locale":"en-US"},"fields":{"title":"eBook-OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/TZ4sO8yUbKdkf4ZWh5qPd/2d0ae6cc8be199a09aa16cd8154eecae/eBook-OpenID.png","details":{"size":250842,"image":{"width":600,"height":856}},"fileName":"eBook-OpenID.png","contentType":"image/png"}}},"description":"OpenID Connect is the de facto standard for handling authentication in the modern world. From traditional web applications to single-page apps to native applications, OpenID Connect provides a template for interoperability that makes it easy to incorporate identity management seamlessly and securely. Learn how this standard works and how you can leverage it to enhance user experience and security today.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5k11TJF3qmQrpNHdnW6xAS","type":"Asset","createdAt":"2019-07-29T17:05:36.556Z","updatedAt":"2019-11-06T11:20:45.865Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"TC-OpenID-ebook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5k11TJF3qmQrpNHdnW6xAS/27cf2eddce76505e2eca5f1f1579561b/TC-OpenID-ebook.png","details":{"size":1103107,"image":{"width":2400,"height":1260}},"fileName":"TC-OpenID-ebook.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1582QzIZd8vUhdlQABNODd","type":"Asset","createdAt":"2019-08-09T15:45:36.605Z","updatedAt":"2019-11-06T11:20:43.606Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"locale":"en-US"},"fields":{"title":"the-openid-connect-handbook-1_1","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1582QzIZd8vUhdlQABNODd/a1bf33e5c1f99caf0466f9456a28091b/the-openid-connect-handbook-1_1.epub","details":{"size":2130365},"fileName":"the-openid-connect-handbook-1_1.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7pXoFWwEciDBmxEklweBKL","type":"Asset","createdAt":"2019-08-09T15:45:49.920Z","updatedAt":"2019-11-06T11:20:43.059Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"locale":"en-US"},"fields":{"title":"the-openid-connect-handbook-1_1","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/7pXoFWwEciDBmxEklweBKL/2621fe2b79c932fcddecb711bd6679fd/the-openid-connect-handbook-1_1.pdf","details":{"size":521995},"fileName":"the-openid-connect-handbook-1_1.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"416DyORxMz0oUqMqAZTLPS","type":"Entry","createdAt":"2019-07-29T17:02:39.173Z","updatedAt":"2019-07-29T17:02:39.173Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Bruno Krebs","job_title":"R\u0026D Content Architect","twitter":"https://twitter.com/brunoskrebs","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4Nq7cbGr2Pg0lZHBr2ea8n","type":"Asset","createdAt":"2019-07-29T17:02:33.314Z","updatedAt":"2019-11-06T11:20:47.587Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"bruno-krebs","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4Nq7cbGr2Pg0lZHBr2ea8n/495dc08cd31e703fcb3c80afed6d4871/bruno-krebs.png","details":{"size":314657,"image":{"width":512,"height":512}},"fileName":"bruno-krebs.png","contentType":"image/png"}}},"bio":"I am passionate about developing highly scalable, resilient applications. I love everything from the database, to microservices (Kubernetes, Docker, etc), to the frontend. I find amazing to think about how all pieces work together to provide a fast and pleasurable experience to end users, mainly because they have no clue how complex that \"simple\" app is."}},"content":"1. Introduction\n 1. A Word on Entity and Identity\n 1. Authentication vs. Authorization\n 1. Recap\n1. OpenID Connect Introduction\n 1. Authentication Protocols in a Nutshell\n 1. How OpenID Connect Works\n 1. OAuth 2.0 Overview\n 1. OpenID Connect Use Cases\n 1. Recap\n1. OpenID Connect in Action\n 1. Creating an Auth0 Account\n 1. Prerequisites\n1. OpenID Connect and Traditional Web Applications\n 1. OpenID Connect and the Authentication Flows\n 1. Bootstrapping the Project\n 1. Register a Regular Web App with Auth0\n 1. Fetching Information from the Discovery Endpoint\n 1. Initiating the Authentication Process\n 1. Handling the Authentication Callback\n 1. Requesting More Information About Users\n 1. Using SDKs to Authenticate Users\n 1. Recap\n1. Traditional Web Apps and the Delegated Authorization Flow\n 1. The Authorization Code Flow\n 1. Spinning Up a Resource Server\n 1. Requesting Delegated Authorization\n 1. Using SDKs to Request Delegated Authorization\n 1. Recap\n1. OpenID Connect and Single-Page Applications\n 1. The Authentication Dance for SPAs\n 1. Register a Single-Page Application with Auth0\n 1. Bootstrapping the Project\n 1. Integrating SPAs with OIDC Providers\n 1. Integrating SPAs with OIDC Providers – the Easy Way\n 1. Recap","release_details":["Added Chapter 5","Fixed some formatting issues"],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6KedfGpd2Asp3IGb28loyV","type":"Entry","createdAt":"2019-07-29T17:03:12.826Z","updatedAt":"2019-07-29T17:03:12.826Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First release"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"68dv6pBUX5OqV8Dob8FJxF","type":"Entry","createdAt":"2019-08-09T15:40:37.497Z","updatedAt":"2019-08-09T15:40:37.497Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.1","description":"Added the “Traditional Web Apps and the Delegated Authorization Flow” chapter."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4b8vbdYm2oFuGDVkOBspzn","type":"Asset","createdAt":"2020-09-29T22:49:26.258Z","updatedAt":"2020-09-29T22:49:26.258Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4b8vbdYm2oFuGDVkOBspzn/aace682264e2ba60457d8b80ce439a3b/resource_thumb_39.jpg","details":{"size":43742,"image":{"width":581,"height":388}},"fileName":"resource_thumb_39.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The #OpenID Connect Handbook 📙 by @Auth0. Everything you need to know about the de facto web #authentication protocol in one place 🎯 https://auth0.com/resources/ebooks/the-openid-connect-handbook","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"Y4NtjtPFylLX6EWsGcv46","type":"Asset","createdAt":"2019-07-29T17:05:11.171Z","updatedAt":"2019-11-06T11:20:46.396Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"popup-oidc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/Y4NtjtPFylLX6EWsGcv46/cbf4bd67ce36a62d8dfa74c4a2e19dd1/popup-oidc.png","details":{"size":31490,"image":{"width":200,"height":200}},"fileName":"popup-oidc.png","contentType":"image/png"}}},"ocid":"7014z000001cb1KAAQ-aPA4z000000011JGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:18.345Z","title":"An Introduction to Ethereum and Smart Contracts","id":"intro-to-ethereum","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2LVgNY9eLSaSm4yQEqMS8O","type":"Asset","createdAt":"2018-03-06T15:33:36.194Z","updatedAt":"2019-11-06T11:23:22.150Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook An Introduction to E","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2LVgNY9eLSaSm4yQEqMS8O/4a5c3feec95de71fe7ce3e4f23ded592/eBook_An_Introduction_to_E.png","details":{"size":88961,"image":{"width":600,"height":856}},"fileName":"eBook_An Introduction to E.png","contentType":"image/png"}}},"description":"Ever wondered how blockchains work? Or how Bitcoin managed to change the landscape of monetary transactions? Or what's the magic behind Ethereum?\nThen this e-book is for you. In it we delve into the development of blockchains: distributed, immutable, verifiable ledgers for transactions.\nWe explore how they became instrumental in the development of the first large-scale cryptocurrency, Bitcoin, and how its ideas were extended to give birth to Ethereum, a powerful blockchain that marries decentralized transactions with Turing-complete contracts.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1LQ1jrinbq2WAM0Siwca6E","type":"Asset","createdAt":"2018-03-06T15:34:14.589Z","updatedAt":"2019-11-06T11:22:48.240Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"intro-to-ethereum","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1LQ1jrinbq2WAM0Siwca6E/5171e187d18bf123e417ec93e968e869/intro-to-ethereum.png","details":{"size":430996,"image":{"width":2400,"height":1260}},"fileName":"intro-to-ethereum.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"MxTzsJG6COqwq6yQoI20s","type":"Asset","createdAt":"2018-03-06T15:33:57.744Z","updatedAt":"2019-11-06T11:23:02.626Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"intro-to-ethereum","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/MxTzsJG6COqwq6yQoI20s/e01d3ccc047ff21b574a06d869697812/intro-to-ethereum.mobi","details":{"size":1464032},"fileName":"intro-to-ethereum.mobi","contentType":"application/octet-stream"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"A7kB8obAY0EQ4GgEcCSKW","type":"Asset","createdAt":"2018-03-06T15:33:59.696Z","updatedAt":"2019-11-06T11:23:00.452Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"intro-to-ethereum","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/A7kB8obAY0EQ4GgEcCSKW/f913cc45295856bb90a2869ce37c31c4/intro-to-ethereum.epub","details":{"size":1748117},"fileName":"intro-to-ethereum.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"42fINJjatOKiG6qsQQAyc0","type":"Asset","createdAt":"2018-03-06T15:33:57.133Z","updatedAt":"2019-11-06T11:23:04.365Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"intro-to-ethereum","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/42fINJjatOKiG6qsQQAyc0/4127ef0c7ade2b70c4ccc969035fb944/intro-to-ethereum.pdf","details":{"size":1676784},"fileName":"intro-to-ethereum.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1H8TQvb6jyq0ecaQc84cSG","type":"Entry","createdAt":"2018-03-06T15:35:33.525Z","updatedAt":"2018-03-06T15:35:33.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Sebastián Peyrott","twitter":"https://twitter.com/speyrott","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3nPVOrf0jCSIuEc2yOa4is","type":"Asset","createdAt":"2018-03-06T15:34:14.168Z","updatedAt":"2019-11-06T11:22:46.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"sebastian","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3nPVOrf0jCSIuEc2yOa4is/d29bf530cbef6e353b376ace7934afd4/sebastian.png","details":{"size":397911,"image":{"width":700,"height":584}},"fileName":"sebastian.png","contentType":"image/png"}}},"bio":"With a keen interest in native development, Sebastian has worked for 10 years as a software developer.\nHe's gone through mobile game development, Win32 programming, iOS development and even traffic control systems.\nNowadays he enjoys learning and writing about the newest technologies at Auth0."}},"content":"## Contents\n1. Special Thanks `3`\n1. Foreword `4`\n1. Bitcoin and The Blockchain `5`\n 1. Bitcoin and the Double-Spending Problem `5`\n 1. The Blockchain `7`\n 1. Validating Transactions `8`\n 1. Ordering Transactions `11`\n 1. Physics to the Rescue `14`\n 1. Definition `17`\n 1. Example: a Perpetual Message System Using Webtasks and Bitcoin `20`\n 1. The implementation `21`\n 1. The /new endpoint `21`\n 1. The /address endpoint `21`\n 1. The /message endpoint `21`\n 1. The /debugNew endpoint `22`\n 1. The Code `22`\n 1. Deploying the example `24`\n 1. Summary `25`\n2. Ethereum: a Programmable Blockchain `26`\n 1. Introduction `26`\n 1. Blockchain Recap `26`\n 1. Ethereum: a Programmable Blockchain `28`\n 1. Ether `31`\n 1. Smart Contracts `31`\n 1. State `32`\n 1. History `35`\n 1. Solidity and a Sample Smart Contract `36`\n 1. Current and Potential Uses `37`\n 1. The Decentralized Autonomous Organization (DAO) `38`\n 1. A Central Bank or Your Own Coin `38`\n 1. A Crowdfunding System `38`\n 1. Prove That You Said Something in the Past `39`\n 1. Proof of Existence for Digital Assets `39`\n 1. Example: A Simple Login System using Ethereum `40`\n 1. Running the Example `44`\n 1. Get an Ethereum node client `44`\n 1. Create a new Ethereum account to mine some Ether `44`\n 1. Start mining some Ether `45`\n 1. Compile and deploy our Login contract `45`\n 1. Install an Ethereum wallet `46`\n 1. Tell the Ethereum wallet of the contract `46`\n 1. Deploy the backend `49`\n 1. Serve the frontend `49`\n 1. Test everything together! `50`\n 1. Summary `50`\n3. A Practical Authentication Solution for Ethereum Users `51`\n 1. Introduction `51`\n 1. Towards a Practical Authentication Solution for Ethereum Users `52`\n 1. A Login System for Ethereum Users `53`\n 1. Registration `57`\n 1. Authentication `59`\n 1. Cons `60`\n 1. Try it out! `60`\n 1. Get an Ethereum Wallet `61`\n 1. Get Metamask `61`\n 1. Create a New Account `61`\n 1. Get Some Ether `61`\n 1. Get the Mobile Authenticator App `62`\n 1. Get the App `62`\n 1. Register `62`\n 1. Enable Your Ethereum Address for Logins `62`\n 1. Get Your Mobile App (Secondary) Address `62`\n 1. Call the Contract! `63`\n 1. Login to Our Test Site `64`\n 1. Explore the Code `64`\n 1. Summary `65`\n","release_details":["First Release."],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4frXXdAddKMWc0WO2YO4Ai","type":"Entry","createdAt":"2018-03-26T15:59:30.327Z","updatedAt":"2018-03-26T15:59:30.327Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0.0"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1OGGezkcQFGysYPyu1qHg5","type":"Asset","createdAt":"2020-09-29T22:47:04.467Z","updatedAt":"2020-09-29T22:47:04.467Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Ethereum","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1OGGezkcQFGysYPyu1qHg5/b345ec01ebe284b98a38e070b18f3011/resource_thumb_46.jpg","details":{"size":41440,"image":{"width":581,"height":388}},"fileName":"resource_thumb_46.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded An Introduction to Ethereum \u0026 Smart Contracts 📖 by @auth0. Learn about #Ethereum 💠 \u0026 #blockchains⛓ https://auth0.com/resources/ebooks/intro-to-ethereum","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5VKDCPX1jqgIwKqAmoIaKs","type":"Asset","createdAt":"2018-04-23T19:59:28.302Z","updatedAt":"2019-11-06T11:21:50.420Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"intro-to-ethereum","description":"intro-to-ethereum","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5VKDCPX1jqgIwKqAmoIaKs/f2cccf45931e130fc9276dcc41c41f13/intro-to-ethereum-cover-card.png","details":{"size":22864,"image":{"width":628,"height":500}},"fileName":"intro-to-ethereum-cover-card.png","contentType":"image/png"}}},"ocid":"7014z000001cb78AAA-aPA4z000000015MGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.837Z","title":"The Data Playbook","id":"data-playbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6O1ch793Z6Q2CE08ysi6q2","type":"Asset","createdAt":"2018-03-06T15:32:54.560Z","updatedAt":"2019-11-06T11:23:55.547Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook The Data Playbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6O1ch793Z6Q2CE08ysi6q2/d7c6138413ad4f0bb80b2bf011fb3e2c/eBook_The_Data_Playbook.png","details":{"size":68340,"image":{"width":600,"height":856}},"fileName":"eBook_The Data Playbook.png","contentType":"image/png"}}},"description":"This book is aimed at sharing best practices we use when working with data at Auth0.\nIn this book, you'll find various best practices and examples that will help you be as effective as possible when working with data.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"SlxqPvalK6E4O8cm64yMi","type":"Asset","createdAt":"2018-03-06T15:34:15.986Z","updatedAt":"2019-11-06T11:22:45.370Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"data-playbook-tc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/SlxqPvalK6E4O8cm64yMi/38ad0989bcc979719ea043feaa3b76b4/data-playbook-tc.png","details":{"size":197467,"image":{"width":2400,"height":1260}},"fileName":"data-playbook-tc.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5XSndKseXucycEAg6cGAOo","type":"Asset","createdAt":"2018-03-06T15:34:01.771Z","updatedAt":"2019-11-06T11:22:57.634Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"data-playbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5XSndKseXucycEAg6cGAOo/36c8041aa685a624dd5af0431b190cf8/data-playbook.pdf","details":{"size":2096023},"fileName":"data-playbook.pdf","contentType":"application/pdf"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ND0Ht3QcwGcaO6qQyWwuw","type":"Asset","createdAt":"2018-03-06T15:34:47.751Z","updatedAt":"2019-11-06T11:22:15.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"data-playbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6ND0Ht3QcwGcaO6qQyWwuw/47653b090701d5c238a41be77e381f07/data-playbook.epub","details":{"size":2689489},"fileName":"data-playbook.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"64wds3PbLau6CIWGuGqeoI","type":"Asset","createdAt":"2018-03-06T15:34:02.212Z","updatedAt":"2019-11-06T11:22:58.747Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"data-playbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/64wds3PbLau6CIWGuGqeoI/252c6af9847e8df32cd83b811ba4ea91/data-playbook.mobi","details":{"size":3542549},"fileName":"data-playbook.mobi","contentType":"application/octet-stream"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2yHWWs9q8wyE0oYuMUmsqa","type":"Entry","createdAt":"2018-03-06T15:35:34.045Z","updatedAt":"2018-03-06T15:35:34.045Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Pablo Seibelt","twitter":"https://twitter.com/sicarul","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4uvwKHsaqs2ooUwSMmgyOc","type":"Asset","createdAt":"2018-03-06T15:34:15.199Z","updatedAt":"2019-11-06T11:22:45.982Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"sicarul","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4uvwKHsaqs2ooUwSMmgyOc/367d9e2942dae2e3ce0f30ecacec540c/sicarul.jpeg","details":{"size":11836,"image":{"width":200,"height":200}},"fileName":"sicarul.jpeg","contentType":"image/jpeg"}}},"bio":"Pablo Seibelt is a Data Scientist working as the head of Data at Auth0. He likes games, anime \u0026 wiring data between complex systems."}},"content":"## Contents\n1. Preface `3`\n 1. What we’ll learn `3`\n 1. Codee xamples `4`\n 1. Data `4`\n1. The Essence of Data `1`\n 1. What exactly is data? `1`\n 1. Where can we find data? `2`\n1. Data Collection `3`\n 1. Backend databases `3`\n 1. Backend tracking `4`\n 1. Frontend tracking `4`\n 1. Atomicity `5`\n 1. Dates `6`\n 1. Entities `6`\n1. Information Theory `7`\n 1. Let’s start playing `7`\n 1. Shannon’s entropy `9`\n 1. Maximal information coefficient `12`\n1. Statistical functions `18`\n 1. Analyzing the distribution `18`\n 1. What do we mean with the mean? `20`\n1. Univariate, bivariate, and multivariate analysis `24`\n 1. Another dataset `24`\n 1. Univariate analysis `24`\n 1. Bivariate analysis `25`\n 1. Multivariate analysis `29`\n1. Causation vs. Correlation `32`\n 1. Back to Wikipedia `32`\n 1. Machine learning help `33`\n 1. A/B testing `33`\n 1. Causal inference `33`\n1. Data Visualization `34`\n 1. Bar charts `34`\n 1. Line charts `36`\n 1. Scatter plots `39`\n 1. Box plots `39`\n 1. Pie/donut charts `40`\n1. Machine Learning `42`\n 1. Supervised learning `42`\n 1. Unsupervised learning `44`\n 1. Learnmore `45`\n","release_details":["The essence of data.","Properly collecting data.","Information theory and why it is important.","Statistical functions.","Univariate/Bivariate/multivariate analysis.","Data visualization, and more!"],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7hjobWsklU4AM2smuY8kGy","type":"Entry","createdAt":"2018-04-23T20:50:47.910Z","updatedAt":"2018-04-23T20:50:47.910Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0.0","description":"#### Releases\n- The essence of data.\n- Properly collecting data.\n- Information theory and why it is important.\n- Statistical functions.\n- Univariate/Bivariate/multivariate analysis.\n- Data visualization, and more!"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1HO6oWj3DHIZkA3p0GT57L","type":"Asset","createdAt":"2020-09-29T22:39:03.254Z","updatedAt":"2020-09-29T22:39:03.254Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Data Playbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1HO6oWj3DHIZkA3p0GT57L/215ca0cfab5051e788f989372575d638/resource_thumb_41.jpg","details":{"size":73214,"image":{"width":581,"height":388}},"fileName":"resource_thumb_41.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The Data Playbook 📖 by @auth0. Learn how to put your data to work! 📈 https://auth0.com/resources/ebooks/data-playbook","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ByHnU11rMGi8Q86mIig4K","type":"Asset","createdAt":"2018-04-23T20:00:20.653Z","updatedAt":"2019-11-06T11:21:49.866Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"data-playbook","description":"data-playbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ByHnU11rMGi8Q86mIig4K/1c2616f5398bfab3bd295eef6100c7ed/data.png","details":{"size":44779,"image":{"width":628,"height":500}},"fileName":"data.png","contentType":"image/png"}}},"ocid":"7014z000001cb77AAA-aPA4z000000015LGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.466Z","title":"Migrating an AngularJS App to Angular","id":"migrating-to-angular2","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3MD0MZc3QIWYUS6AA4s40W","type":"Asset","createdAt":"2018-03-06T15:33:38.284Z","updatedAt":"2019-11-06T11:23:21.072Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook Migration an AngularJS App","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3MD0MZc3QIWYUS6AA4s40W/3f31b54278310601552cb1fa8cd0d332/eBook_Migration_an_AngularJS_App.png","details":{"size":74666,"image":{"width":600,"height":856}},"fileName":"eBook_Migration an AngularJS App.png","contentType":"image/png"}}},"description":"Are you an Angular developer who hasn't had a practical opportunity to really dig into Angular v2+ yet? Do you have AngularJS 1.x applications in development, production, or maintenance and are curious how you would tackle migrating them to Angular 2+? If you have experience with AngularJS and are looking for a way to apply your previous knowledge while learning the intricacies of Angular, then this tutorial is for you.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"127SAcWoTOEakSqso8mSS0","type":"Asset","createdAt":"2018-03-06T15:34:12.766Z","updatedAt":"2019-11-06T11:22:47.685Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-to-angular2-tc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/127SAcWoTOEakSqso8mSS0/ce697ad5cc4f43ef7d9e925f8b0b7ac5/migrating-to-angular2-tc.png","details":{"size":173342,"image":{"width":2400,"height":1260}},"fileName":"migrating-to-angular2-tc.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.3.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"cnjwOZbTtCccOQScIMIQO","type":"Asset","createdAt":"2018-03-06T15:34:07.206Z","updatedAt":"2019-11-06T11:22:53.887Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-to-angular","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/cnjwOZbTtCccOQScIMIQO/656685ba5d69743730fb734cbb1d50e4/migrating-to-angular.epub","details":{"size":1052726},"fileName":"migrating-to-angular.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4VIwQFSvk4GoOggAcoGkoW","type":"Asset","createdAt":"2018-03-06T15:34:07.625Z","updatedAt":"2019-11-06T11:22:53.337Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-to-angular","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4VIwQFSvk4GoOggAcoGkoW/9089bc6417a3a187a1c3126eb3561ffc/migrating-to-angular.mobi","details":{"size":1670488},"fileName":"migrating-to-angular.mobi","contentType":"application/octet-stream"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4I8HgPbZjq4GMMi2SM4mmG","type":"Asset","createdAt":"2018-03-06T15:34:08.293Z","updatedAt":"2019-11-06T11:22:52.777Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-to-angular","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4I8HgPbZjq4GMMi2SM4mmG/8478dd9123d80a91ee2c997ed5c1befa/migrating-to-angular.pdf","details":{"size":2567176},"fileName":"migrating-to-angular.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5wTvfsL3VKGw8E8MeIEgi8","type":"Entry","createdAt":"2018-03-06T15:35:31.239Z","updatedAt":"2018-03-06T15:35:31.239Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Kim Maida","twitter":"https://twitter.com/KimMaida","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Q4ui2ovsMEQMEWO024oy4","type":"Asset","createdAt":"2018-03-06T15:34:12.189Z","updatedAt":"2019-11-06T11:22:49.257Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"kim","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1Q4ui2ovsMEQMEWO024oy4/c44c6833fe1e6e6cf3f0cfce172b3d3a/kim.png","details":{"size":421518,"image":{"width":584,"height":500}},"fileName":"kim.png","contentType":"image/png"}}},"bio":"Kim Maida is a Technical Writer for Auth0 (and in a past life, she led engineering teams).\nShe is passionate about building secure applications for the web, particularly with full-stack JavaScript.\nIn her free time, she loves spending time with her family (husband, young son, German Shepherd, and three cats), 4x4 overlanding, running, hiking, and cooking."}},"content":"## Contents\n1. Introduction `4`\n 1. AngularJS 1 and Angular 2+ `4`\n 1. Migrate vs.Upgrade `5`\n2. Angular 1 App “ng1-dinos” `6`\n 1. Dependencies `6`\n 1. Install and Run “ng1-dinos” `6`\n3. Introducing Angular 2 App “ng2-dinos” `8`\n 1. Dependencies `8`\n 1. Initialize ng2-dinos `9`\n 1. Linting and StyleGuide `9`\n4. Customizing Our Angular 2 Project for Migration `11`\n 1. Bootstrap CSS `11`\n 1. Third Party Libraries `12`\n 1. Global SCSS `13`\n 1. Update App File Structure `15`\n5. Angular 2 Root App Component `16`\n 1. App Component Template `17`\n 1. App Component Styles `18`\n 1. App Component TypeScript `18`\n6. Angular 2 Header Component `20`\n 1. Add Header Element to App Component Template `21`\n 1. Header Component Template `22`\n 1. Header Component Styles `22`\n7. Angular 2 Component Interaction `25`\n 1. Header Component TypeScript `25`\n 1. Header Communication with App Component `26`\n8. Angular 2 Observables and DOM Properties `29`\n 1. Add Observable to App Component TypeScript `29`\n 1. Add DOM Property to App Component Template `31`\n9. Angular 2 Footer Component `33`\n 1. Footer Component TypeScript `33`\n 1. Footer Component Template `34`\n 1. Footer Component Styles `34`\n 1. Add Footer to App Component Template `34`\n10. Migrating Angular 2 Pages `36`\n 1. Create Home, About, and 404 Page Components `36`\n 1. Add Title Provider to App Module `36`\n 1. Add Title to Page Components `37`\n 1. Home Component Template `39`\n 1. About Component Template `39`\n 1. 404 Component Template `40`\n11. Routing in Angular 2 `41`\n 1. Create a Routing Module `41`\n 1. Import Routing Module in App Module `43`\n 1. Display Routed Components `43`\n 1. Route Navigation `44`\n 1. Router Events `45`\n 1. Auto-close Menu in Header Component `45`\n12. Calling an API in Angular 2 `47`\n 1. Dinosaur API Data Model `47`\n 1. Add HTTP Client Module to App Module `48`\n 1. Get API Data with Dinos Service `49`\n 1. Provide the Dinos Service in App Module `50`\n 1. Use the Dinos Service in Home Component `51`\n 1. Display a List of Dinosaurs `52`\n13. Display Dino Cards `55`\n 1. Dino Card Component TypeScript `55`\n 1. Dino Card Component Template `56`\n 1. Display Dino Card in Home Component `56`\n14. Migrating Angular 1 Filtering to Angular 2 `58`\n 1. No Filter or OrderBy Pipes `58`\n 1. Create a Filter Service `59`\n 1. Use Angular 2 Filter Service to Search `60`\n 1. Filter in Home Component TypeScript `60`\n 1. Filter in Home Component Template `62`\n 1. Filter in Home Component Styles `63`\n15. Migrating Detail Component to Angular 2 `65`\n 1. Routing with Parameters `65`\n 1. Linking to Routes with Parameters `66`\n16. Calling the API for Data by ID `67`\n 1. Create a Dino Details Model `67`\n 1. Add HTTP Observable to Get Dinosaur by ID `68`\n 1. Using API Data in Detail Component `69`\n 1. Detail Component TypeScript `69`\n 1. Detail Component Template `70`\n 1. Detail Component Styles `72`\n17. Loading State for API Calls `74`\n 1. Loading Image Asset `74`\n 1. Loading Component TypeScript `74`\n 1. Add Loading Component to App Module `75`\n 1. Add Loading Component to Home Component `76`\n 1. Implement Loading Functionality in Home Component TypeScript `76`\n 1. Implement Loading Functionality in Home Component Template `77`\n 1. Add Loading Component to Detail Component `79`\n 1. Implement Loading Functionality in Detail Component TypeScript `79`\n 1. Implement Loading Functionality in Detail Component Template `80`\n 1. Remove “Loading. . . ” Text from Index HTML `80`\n18. Completed Migration `82`\n 1. Refactoring Suggestions `82`\n19. Bonus: Authenticate an Angular App and Node API with Auth0 `83`\n 1. Features `84`\n 1. Sign Up for Auth0 `85`\n 1. Set Up a Client App `85`\n 1. Set Up an API `85`\n 1. Dependencies and Setup `85`\n 1. Authentication Service `87`\n 1. Making Authenticated API Requests `90`\n 1. Final Touches: Route Guard and Profile Page `90`\n 1. More Resources `91`\n20. Conclusion `92`\n","release_details":["Angular application updated to Angular v4.3, including updates to the Angular CLI and HttpClient implementation."],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"37PEaIsSzYCsAgSKaoGqKw","type":"Entry","createdAt":"2018-03-26T16:01:45.944Z","updatedAt":"2018-03-26T16:01:45.944Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.3.0","description":"#### Releases\n- Angular application updated to Angular v4.3, including updates to the Angular CLI and HttpClient implementation."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3FF1uqwlwbDgiJAUEID12e","type":"Asset","createdAt":"2020-09-29T22:37:49.956Z","updatedAt":"2020-09-29T22:37:49.956Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Angular","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3FF1uqwlwbDgiJAUEID12e/442d59a913d5a86a87d2c5a52b907378/resource_thumb_43.jpg","details":{"size":49273,"image":{"width":581,"height":388}},"fileName":"resource_thumb_43.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded Migrating an AngularJS App to Angular 📖 by @auth0. Migrate #AngularJS app ➡ fresh #Angular build! https://auth0.com/resources/ebooks/migrating-to-angular2","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2fdH0GnalaucSUQ2Km2SQ2","type":"Asset","createdAt":"2018-04-23T19:58:33.626Z","updatedAt":"2019-11-06T11:21:50.917Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"migrating-to-angular2","description":"migrating-to-angular2","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2fdH0GnalaucSUQ2Km2SQ2/c6d71b0f099a131fef57d4995f7e5415/angular.png","details":{"size":21635,"image":{"width":628,"height":500}},"fileName":"angular.png","contentType":"image/png"}}},"ocid":"7014z000001cb0YAAQ-aPA4z000000010qGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:06.062Z","title":"Migrating a PHP 5 app to PHP 7 Guide","id":"migrating-to-php7","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ZJWRvwedysuiskqaake60","type":"Asset","createdAt":"2018-03-06T15:33:39.530Z","updatedAt":"2019-11-06T11:23:19.926Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook PHP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ZJWRvwedysuiskqaake60/72219d23a5bfc289887b43184434c00f/eBook_PHP.png","details":{"size":83807,"image":{"width":600,"height":856}},"fileName":"eBook_PHP.png","contentType":"image/png"}}},"description":"Many PHP applications are still running on PHP 5.x, not taking full advantage of the awesome features that PHP 7 offers.\nA lot of developers have not made the switch because of certain fears of compatibility issues, migration challenges, and the awkward feeling that migrating their apps will take away a big chunk of their time.\nIf you are looking for a way to understand PHP 7 features like a boss, and migrate that PHP 5 app without hitting your head against the wall, then this handbook is for you.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"421SL6cXm06066k48GMUuG","type":"Asset","createdAt":"2018-03-06T15:34:10.806Z","updatedAt":"2019-11-06T11:22:48.735Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-to-php7-tc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/421SL6cXm06066k48GMUuG/170a811119092d25651260f89bb10cc1/migrating-to-php7-tc.png","details":{"size":178989,"image":{"width":2400,"height":1260}},"fileName":"migrating-to-php7-tc.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2xiSuPfq9yy0uWCEcy6GeK","type":"Asset","createdAt":"2018-03-06T15:33:53.241Z","updatedAt":"2019-11-06T11:23:06.508Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-a-php5-app-to-php7","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2xiSuPfq9yy0uWCEcy6GeK/c6369aa1fa7cb5b74cd676667d808043/migrating-a-php5-app-to-php7.mobi","details":{"size":4423813},"fileName":"migrating-a-php5-app-to-php7.mobi","contentType":"application/octet-stream"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5vvZ7qXYA0AsMyEs8a4WsY","type":"Asset","createdAt":"2018-03-07T13:04:30.399Z","updatedAt":"2019-11-06T11:23:07.005Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-a-php5-app-to-php7","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5vvZ7qXYA0AsMyEs8a4WsY/9f7a29f4f34ae55e7db5a838d4cce6ad/migrating-a-php5-app-to-php7.epub","details":{"size":8716159},"fileName":"migrating-a-php5-app-to-php7.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Q4rdqb4xWqUIEcW6s2w2A","type":"Asset","createdAt":"2018-03-06T15:34:05.801Z","updatedAt":"2019-11-06T11:22:54.391Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"migrating-a-php5-app-to-php7","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3Q4rdqb4xWqUIEcW6s2w2A/04aa9ca74e029a41364ba57b3f2969d8/migrating-a-php5-app-to-php7.pdf","details":{"size":9643482},"fileName":"migrating-a-php5-app-to-php7.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1BrtPJEyYgwwkAswwKsQ8Y","type":"Entry","createdAt":"2018-03-06T15:35:30.480Z","updatedAt":"2018-03-06T15:35:30.480Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Prosper Otemuyiwa","twitter":"https://twitter.com/unicodeveloper","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6eImqFgRawGSioKySU0G0M","type":"Asset","createdAt":"2018-03-06T15:34:11.499Z","updatedAt":"2019-11-06T11:22:50.109Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"prosper","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6eImqFgRawGSioKySU0G0M/47b64cea1b42d756e8054500ff4be3de/prosper.png","details":{"size":373345,"image":{"width":700,"height":584}},"fileName":"prosper.png","contentType":"image/png"}}},"bio":"Prosper is an avid Open Source Advocate, Evangelist, and a Google Developer Expert in Web Technologies.\nHe is very passionate about building developer communities across Africa. He loves to travel and play football."}},"content":"## Contents\n1. Introduction `4`\n 1. PHP5 and PHP7 `4`\n2. Upgrading your development environment to PHP7 `6`\n 1. Mac OS X `6`\n 1. Windows `7`\n 1. Ubuntu `7`\n 1. Debian `8`\n 1. Cent OS / Red Hat Enterprise Linux `8`\n 1. phpbrew `9`\n 1. Vagrant `11`\n 1. Laravel Homestead `11`\n 1. phpdev `12`\n 1. Valet `12`\n 1. Docker `15`\n 1. php7-dockerized `15`\n 1. Laradock `15`\n 1. phpdocker `16`\n3. Elementary Language Changes `17`\n 1. SpaceShip operator `17`\n 1. Array Constants `19` \n 1. Null Coalescing Operator `19`\n 1. Integer Division `20`\n 1. Regular Expressions `20`\n 1. Filtered unserialize() `21`\n 1. Cryptographically Secure Pseudorandom Number Generator (CSRPNG) `22`\n 1. session_start config enhancements `22`\n 1. Unpack objects with list() `22`\n 1. dirname() enhacement `23`\n 1. Reflection API Enhancements `23`\n 1. Reserved Words `24`\n4. Scalar Typehinting \u0026 Return type declarations `26`\n 1. Typehinting `26`\n 1. Return Types `27`\n 1. Strong types checks `28`\n5. Error handling, Expections and Assertions `29`\n 1. Expections and Assertions `30`\n6. Closures and Generators `32`\n 1. Generator return expressions `33`\n 1. Generator Delegation `33`\n7. Object-oriented Programming enhancement `35`\n 1. Anonymous Classes `35`\n 1. Group Use Declarations `36`\n8. Better Unicode support `37`\n 1. IntlChar `38`\n9. Deprecated and removed features `39`\n 1. Removed extensions and Server APIs `40`\n 1. Backward Incompatible changes `41`\n10. Uniform Variable syntax and static values `43`\n 1. Accessing static values `43`\n11. Migration Tools `45`\n 1. PHP 7 MAR `45`\n 1. PHP 7 Compatibility Checker `46`\n 1. Phan `46`\n 1. phpto7aid `46`\n 1. PhpStorm PHP 7 Compatibility Inspection `46`\n12. Practial Migration of two Apps `48`\n 1. Building a PHP5 App `48`\n 1. Create and configure Auth0 client `48`\n 1. Build the App `53`\n 1. Run the App `62`\n 1. Migrate to PHP 7 `64`\n 1. API `64`\n 1. Use PHP 7 Features `66`\n13. Introducing PHP 7.1 Features `71`\n 1. Nullable Types `71`\n 1. Void Type `72`\n 1. Symmetric Array Destructuring `72`\n 1. Class constant visibility `73`\n 1. Multi-Catch Exception Handling `73`\n 1. Iterables `74`\n 1. Keys support in list() `74`\n 1. Negative string Offset Support 75\n 1. Conversion of Callables to Closures `75`\n 1. Asynchronous Signal Handling `76`\n 1. Support for HTTP/2 Server Push `76`\n 1. Better Error Retrieval `76`\n 1. Throw Error on Passing too fews functions arguments `77`\n14. Performance Evaluation `78`\n15. Conclusion `85`","release_details":["Setup and development environment.","A comprehensive rundown of PHP 7 features.","Migrating an API and a Web Application to PHP 7."],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"76mkMdRpXUsiuweIOQYqGa","type":"Entry","createdAt":"2018-04-23T20:30:48.558Z","updatedAt":"2018-04-23T20:30:48.559Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0.0","description":"#### Releases\n- Setup and development environment.\n- A comprehensive rundown of PHP 7 features.\n- Migrating an API and a Web Application to PHP 7."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7l7xvM8CCGXSL4Bwg9UId8","type":"Asset","createdAt":"2020-09-29T22:13:33.941Z","updatedAt":"2020-09-29T22:13:33.941Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"PHP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7l7xvM8CCGXSL4Bwg9UId8/e57460aab3275dfa6f190e8493b01cab/resource_thumb_42.jpg","details":{"size":53834,"image":{"width":581,"height":388}},"fileName":"resource_thumb_42.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded the Migrating a #PHP5 app to #PHP7 Guide 📖 by @auth0. Take advantage of PHP 7 features now! https://auth0.com/resources/ebooks/migrating-to-php7","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3seHd9vZWUuqCuo0Ie8KIU","type":"Asset","createdAt":"2018-04-23T19:57:41.777Z","updatedAt":"2019-11-06T11:21:51.444Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"migrating-to-php7","description":"migrating-to-php7","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3seHd9vZWUuqCuo0Ie8KIU/97b5304f9ba204a6c0b5ece17976390e/php.png","details":{"size":35239,"image":{"width":628,"height":500}},"fileName":"php.png","contentType":"image/png"}}},"ocid":"7014z000001cb0ZAAQ-aPA4z000000010rGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:04.780Z","title":"Authentication Survival Guide","id":"authentication-survival-guide","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1c9zARV8seWicSWQ0Qs2YG","type":"Asset","createdAt":"2018-03-06T15:33:36.850Z","updatedAt":"2019-11-06T11:23:22.683Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"eBook Authentification Survival Guide","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1c9zARV8seWicSWQ0Qs2YG/8bed0441c1209351aff182120a513951/eBook_Authentification_Survival_Guide.png","details":{"size":112816,"image":{"width":600,"height":856}},"fileName":"eBook_Authentification Survival Guide.png","contentType":"image/png"}}},"description":"This book aims to be an accessible starting point for everyone that is starting to work with authentication.\n In this book, you'll find a concise review of all the key protocols, formats, concepts and terminology that you'll likely\n come across when implementing authentication.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"24mSevTdEYM0giSwEgGw6k","type":"Asset","createdAt":"2018-03-06T15:34:17.405Z","updatedAt":"2019-11-06T11:22:43.377Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"survival-guide-tc","file":{"url":"//images.ctfassets.net/2ntc334xpx65/24mSevTdEYM0giSwEgGw6k/004575fc42d1fa6fea0a21e278726519/survival-guide-tc.png","details":{"size":214112,"image":{"width":2400,"height":1260}},"fileName":"survival-guide-tc.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ODWZP2Q9qMGwaEwmIWMma","type":"Asset","createdAt":"2018-03-06T15:34:03.451Z","updatedAt":"2019-11-06T11:22:57.140Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"authentication-survival-guide","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1ODWZP2Q9qMGwaEwmIWMma/3f740e82b04c2351c97cf87960d434ae/authentication-survival-guide.epub","details":{"size":618924},"fileName":"authentication-survival-guide.epub","contentType":"application/epub+zip"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6CTKUiISqs08Kga28Auqku","type":"Asset","createdAt":"2018-03-06T15:34:02.871Z","updatedAt":"2019-11-06T11:22:56.093Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"authentication-survival-guide","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6CTKUiISqs08Kga28Auqku/a87fc0d765fb8c18280afffe26aece64/authentication-survival-guide.pdf","details":{"size":197563},"fileName":"authentication-survival-guide.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4su5oVFxpKkGCwgc8siqeS","type":"Entry","createdAt":"2018-03-06T15:35:34.822Z","updatedAt":"2018-03-06T15:35:34.822Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"João Angelo","twitter":"https://twitter.com/jmpangelo","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6hNx1Gefraa8a8Aqwsg4Us","type":"Asset","createdAt":"2018-03-06T15:34:16.730Z","updatedAt":"2019-11-06T11:22:43.897Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"joao","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6hNx1Gefraa8a8Aqwsg4Us/662e7bfa3a89cbe40618f2c8d0235dda/joao.png","details":{"size":503027,"image":{"width":700,"height":584}},"fileName":"joao.png","contentType":"image/png"}}},"bio":"João is a software developer at heart that traded his IDE for the possibility to help fellow developers with their authentication and authorization challenges.\nWhen not at the computer you'll likely find him exercising his creativity in the kitchen."}},"content":"## Contents\n1. Special Tanks `4`\n1. Introduction `5`\n1. Concepts `7`\n1. OAuth 2.0 `8`\n1. OpenID Connect `12`\n1. Enterprise Protocols `14`\n 1. SAML `15`\n 1. WS-Federation `16`\n1. Brief look into the past (OpenID and OAuth 1.0a) `18`\n1. Token overload `19`\n 1. Formats `20`\n 1. Types `22`\n 1. Storage `27`\n 1. But I love my cookies `31`\n1. Troubleshooting `33`\n 1. It's just HTTPS `33`\n 1. Tools `36`\n1. Pitfalls `38`\n1. Glossary `40`\n","release_details":["Authentication terminology.","OAuth 2.0","OpenID Connect.","Enterprise protocols.","Tokens tokens tokens.","Troubleshooting tips."],"releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4hOB06XAYUMKIm8ooucKAG","type":"Entry","createdAt":"2018-04-23T20:23:17.017Z","updatedAt":"2018-04-23T20:23:17.017Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0.0","description":"#### Releases\n- Authentication terminology.\n- OAuth 2.0\n- OpenID Connect.\n- Enterprise protocols.\n- Tokens tokens tokens.\n- Troubleshooting tips."}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7cdhrdiJpVl7rCmcNtYTXa","type":"Asset","createdAt":"2020-09-29T22:11:20.721Z","updatedAt":"2020-09-29T22:11:20.721Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication Survival Guide","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7cdhrdiJpVl7rCmcNtYTXa/0125e1d15d01453d2f5b1d6a5b9e7be6/resource_thumb_45.jpg","details":{"size":92810,"image":{"width":581,"height":388}},"fileName":"resource_thumb_45.jpg","contentType":"image/jpeg"}}},"tweet":"I just downloaded The Authentication Survival Guide 📖 by @auth0 🙌. All you need to know about #authentication! 🔐⚔ https://auth0.com/resources/ebooks/authentication-survival-guide","push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CPNDLgkx2UGW0ogUcEeKk","type":"Asset","createdAt":"2018-04-23T20:01:33.067Z","updatedAt":"2019-11-06T11:21:49.265Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"authentication-survival-guide","description":"authentication-survival-guide","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3CPNDLgkx2UGW0ogUcEeKk/6597c6ced490344420ff0137cf65b215/authentication-survival-guide.png","details":{"size":61988,"image":{"width":628,"height":500}},"fileName":"authentication-survival-guide.png","contentType":"image/png"}}},"ocid":"7014z000001cb0bAAA-aPA4z000000010tGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:09:04.073Z","title":"SC Magazine Product Review: Identity and Access Management - Auth0","id":"sc-magazine-product-review-2020","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"19PWF4RVlbnbyUk9N6ZBWf","type":"Asset","createdAt":"2020-08-11T20:02:36.793Z","updatedAt":"2020-08-11T20:09:45.069Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Resources Page Cover (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/19PWF4RVlbnbyUk9N6ZBWf/3fb7699b28c568441129b1264fa819d3/Resources_Page__Cover__2_.jpeg","details":{"size":45959,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (2).jpeg","contentType":"image/jpeg"}}},"description":"\nIdentity and access management products are vital to enterprise security across industries and greatly enhance existing security investments. In addition to bringing in an extra layer of security and going a step farther with data loss prevention, their capabilities and features can increase productivity and overall return on investment. \n\nIn this report, SC Labs examines Auth0, a cloud-based identity solution offering a universal authentication and authorization platform that protects the identities of all user types in any application. \n\nFrom SC Media. ©2020 CyberRisk Alliance, LLC. All rights reserved. Used under license.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"23dmtdXzHGS3Q0bE6qkUtL","type":"Asset","createdAt":"2020-08-11T20:03:15.116Z","updatedAt":"2020-08-11T20:03:15.116Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Share Asset (3) (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/23dmtdXzHGS3Q0bE6qkUtL/3ddb00f9010da823dd652c5b4ab5b6f3/Resources_Page__Share_Asset__3___1_.jpeg","details":{"size":620382,"image":{"width":5000,"height":2625}},"fileName":"Resources Page_ Share Asset (3) (1).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"01","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2AoTcHhU19pK6ngiV5caeY","type":"Asset","createdAt":"2020-08-11T20:04:38.048Z","updatedAt":"2020-08-11T20:04:38.048Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"SC-Magazine-Product-Review-Identity-Management-Auth0","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2AoTcHhU19pK6ngiV5caeY/512d115c8fcbb8a9954ea532d0451828/SC-Magazine-Product-Review-Identity-Management-Auth0.pdf","details":{"size":183350},"fileName":"SC-Magazine-Product-Review-Identity-Management-Auth0.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"0. Introduction\n1. Strengths\n2. Weaknesses \n3. Verdict\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6KedfGpd2Asp3IGb28loyV","type":"Entry","createdAt":"2019-07-29T17:03:12.826Z","updatedAt":"2019-07-29T17:03:12.826Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First release"}}],"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5CCxmMQL65pBK1OBAGWS0c","type":"Asset","createdAt":"2020-09-29T18:48:19.750Z","updatedAt":"2020-09-29T18:48:19.750Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"SC Magazine Product Review","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5CCxmMQL65pBK1OBAGWS0c/b0c7399d47508cf32e9bd6d65cbb2ed0/resource_thumb_78.jpg","details":{"size":48991,"image":{"width":581,"height":388}},"fileName":"resource_thumb_78.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7bQbENMaZqo2CeVHEBiYlN","type":"Asset","createdAt":"2020-08-11T20:07:36.695Z","updatedAt":"2020-08-11T20:07:36.695Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Resources Page Share Asset (3) (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7bQbENMaZqo2CeVHEBiYlN/f9025517ae2f36124908d8ea7d4cc503/Resources_Page__Share_Asset__3___1_.jpeg","details":{"size":620382,"image":{"width":5000,"height":2625}},"fileName":"Resources Page_ Share Asset (3) (1).jpeg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb3KAAQ-aPA4z000000012MGAQ"},{"type":"ebooks","updatedAt":"2021-07-22T17:22:30.775Z","title":"Infographic: Building Constituent Trust","id":"govtech-building-constituent-trust-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3xWm3m87oTkOAtb2DBVMTJ","type":"Asset","createdAt":"2021-07-22T17:08:47.554Z","updatedAt":"2021-07-22T17:08:47.554Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Building Constituent Trust","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3xWm3m87oTkOAtb2DBVMTJ/ae1167ce8b51a31b7b289b51cc47a1ac/_Landing_Page__Gated_Content___Logo__625x892px__GovTech_Infographic.jpeg","details":{"size":135191,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content + Logo (625x892px)_GovTech_Infographic.jpeg","contentType":"image/jpeg"}}},"description":"__A Better Way to Implement Identity and Access Management:__\nState and local government organizations traditionally faced a tough choice on access management tools: Build it yourself or buy it off the shelf from a third-party vendor? In this infographic, see how organizations today can do both.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7EKQ4lI5eth1dkOhV9W3W7","type":"Asset","createdAt":"2021-07-22T17:11:29.656Z","updatedAt":"2021-07-22T17:11:29.656Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Building Constituent Trust","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7EKQ4lI5eth1dkOhV9W3W7/b6d13b47b172605403ef6a39287d7870/-Share_Asset-_Whitepaper__Horizontal__GovTech_Infographic.jpeg","details":{"size":1336661,"image":{"width":5000,"height":2432}},"fileName":"[Share Asset] Whitepaper (Horizontal)_GovTech Infographic.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":false,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Hq5yaMMozA804DSfj2UV1","type":"Asset","createdAt":"2021-07-22T17:12:05.880Z","updatedAt":"2021-07-22T17:12:05.880Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographic: Building Constituent Trust","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3Hq5yaMMozA804DSfj2UV1/fd042fa089b8042e5cd5c3d93dad4f37/Auth0-Infographic-Building-Constituent-Trust-GovTech.pdf","details":{"size":616453},"fileName":"Auth0-Infographic-Building-Constituent-Trust-GovTech.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"What you need to know about:\n1. Building IAM\n2. Buying IAM\n3. Doing both\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"EN"},{"type":"ebooks","updatedAt":"2021-05-04T20:17:17.159Z","title":"Voice of the Customer: Access Management","id":"gartner-peer-insights-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7BefsBcVaSrOcuw66Xu1K1","type":"Asset","createdAt":"2021-05-03T21:24:06.223Z","updatedAt":"2021-05-03T21:41:13.119Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"gartner-cover-image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7BefsBcVaSrOcuw66Xu1K1/62837a4a73dd00d9ed1978fed8c7d83a/gartner-thumbnail-v3.jpg","details":{"size":80391,"image":{"width":600,"height":856}},"fileName":"gartner-thumbnail-v3.jpg","contentType":"image/jpeg"}}},"description":"In April 2021, Auth0 was recognized with Gartner Peer Insights’ Customers’ Choice distinction for Access Management. The recognition, along with the review criteria for the distinction, are found in Gartner’s annual Voice of the Customer document. This eBook discusses what Gartner Peer Insights and its recognitions are, as well as highlights Auth0’s placement. \n\nGartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4OSz2G9F7ApdR2AQVWFcbF","type":"Asset","createdAt":"2021-05-03T21:24:53.660Z","updatedAt":"2021-05-03T21:24:53.660Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"gartner-share-horizontal","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4OSz2G9F7ApdR2AQVWFcbF/b25a7c8f055a2e7a806975b2f411c4ab/gartner-share-horizontal.jpg","details":{"size":1203987,"image":{"width":5000,"height":2432}},"fileName":"gartner-share-horizontal.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"0.1","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3X5AOUwxVD2I61ZBmftEyv","type":"Asset","createdAt":"2021-05-04T20:17:14.012Z","updatedAt":"2021-05-04T20:17:14.012Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Gartner Peer Insights Ebook Auth0","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3X5AOUwxVD2I61ZBmftEyv/6d104814913f67814469299e8a74b419/Gartner_Peer_Insights_Ebook_Auth0.pdf","details":{"size":724662},"fileName":"Gartner Peer_Insights_Ebook_Auth0.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"I. What Is Access Management?\nII. What Is Gartner Peer Insights “Voice of the Customer”?\nIII. What Is the Gartner Peer Insights Customers’ Choice?","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1jNLaXSK8gaM7Qvscs2Kf2","type":"Entry","createdAt":"2020-03-10T14:59:23.532Z","updatedAt":"2020-03-10T14:59:23.532Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"0.1","description":"Initial release that contains the first three chapters."}}],"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2ihsWJzDxsC7f2UfagiRid","type":"Asset","createdAt":"2021-05-03T21:38:22.809Z","updatedAt":"2021-05-03T21:38:22.809Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Share Asset] Guide (Square)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2ihsWJzDxsC7f2UfagiRid/afdcb701bbd23a7606b3926616266301/-Share_Asset-_Guide__Square_.jpeg","details":{"size":1695929,"image":{"width":5001,"height":5001}},"fileName":"[Share Asset] Guide (Square).jpeg","contentType":"image/jpeg"}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"36vzADuwk1ofCGTsCEWZSL","type":"Asset","createdAt":"2021-05-03T21:37:55.929Z","updatedAt":"2021-05-03T21:37:55.929Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Share Asset] Guide (Square)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/36vzADuwk1ofCGTsCEWZSL/249098e096e99d776d1191ea79db6040/-Share_Asset-_Guide__Square_.jpeg","details":{"size":1695929,"image":{"width":5001,"height":5001}},"fileName":"[Share Asset] Guide (Square).jpeg","contentType":"image/jpeg"}}}},{"type":"ebooks","updatedAt":"2025-03-25T13:28:10.645Z","title":"Enrichissez votre expérience utilisateur avec un CIAM | Auth0","id":"fr-improving-user-experiences-with-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2nPo4hxusNw3mc8VLdkEK8","type":"Asset","createdAt":"2025-03-25T10:38:16.850Z","updatedAt":"2025-03-25T10:38:16.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 3 Auth0 Final fr","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2nPo4hxusNw3mc8VLdkEK8/f6ada7de6ca4e8f8168b18cf7bbd6197/Okta_Ebook_Asset_3_Auth0_Final_fr.png","details":{"size":203548,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_fr.png","contentType":"image/png"}}},"description":"Tout avantage peut jouer un rôle clé dans la conquête et la rétention des clients.\n\nCet eBok vous montrera comment gérer efficacement les identités clients. Téléchargez-le pour découvrir :\n\nComme un CIAM peut vous aider à implémenter le progressive profiling et tirer avantage des données zero-party\nComment sécuriser en toute transparence vos données clients grâce au blocage des bots, au MFA et à la détection des mots de passe compromis\nComment faire de la création de comptes et des connexions ultérieures un processus fluide et agréable pour les clients","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7x6NukznOBGQTpSTg94Fh4","type":"Asset","createdAt":"2025-03-21T11:20:46.411Z","updatedAt":"2025-03-21T11:20:46.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Improving User Experiences with CIAM - FR Placeholder","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7x6NukznOBGQTpSTg94Fh4/83b75bc3ff6a2305aaffdbe47976e041/Improving_User_Experiences_with_CIAM_-_FR_Placeholder.jpg","details":{"size":93489,"image":{"width":1600,"height":840}},"fileName":"Improving User Experiences with CIAM - FR Placeholder.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4EqgjOGTUdNlChY8VltVP1","type":"Asset","createdAt":"2025-03-21T11:27:10.423Z","updatedAt":"2025-03-21T11:27:10.423Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 3 Auth0 Final fr","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4EqgjOGTUdNlChY8VltVP1/8f341967fc6f839631163a76e4807aef/Okta_Ebook_Asset_3_Auth0_Final_fr.pdf","details":{"size":966886},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_fr.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. Introduction `2`\n2. Qu’est-ce que le CIAM ? `3`\n3. L’importance du CIAM `4`\n4. L’approche unique d’Auth0 en matière de CIAM `4`\n5. Inscription et connexion fluides `5`\n6. Personnalisation simplifiée grâce au CIAM `8`\n7. Comment le CIAM améliore à la fois la sécurité et l’expérience `11`\n8. Intégration de l’IA générative aux expériences utilisateurs grâce au CIAM `12`\n9. Conclusion `13`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ZoYm7oorFLX8nuC5ouLWr","type":"Entry","createdAt":"2025-03-21T11:28:43.164Z","updatedAt":"2025-03-21T11:28:43.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001YyUgAAK-aPA4z000000kA4oGAE"},{"type":"ebooks","updatedAt":"2025-03-25T13:25:48.878Z","title":"Erfolgreiche User Experiences mit CIAM | Auth0","id":"de-improving-user-experiences-with-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2QpDpY83D77v64TKg2abcX","type":"Asset","createdAt":"2025-03-25T10:37:24.437Z","updatedAt":"2025-03-25T10:37:24.437Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 3 Auth0 Final de","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2QpDpY83D77v64TKg2abcX/251e611faac6e5dcfa001822d9800bf4/Okta_Ebook_Asset_3_Auth0_Final_de.png","details":{"size":199175,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_de.png","contentType":"image/png"}}},"description":"Jeder kleine Vorteil ist ein großer Vorteil beim Gewinnen und Halten von Kunden.\n\nIn diesem Whitepaper erfahren Sie, wie Sie Kundenidentitäten effektiv verwalten können. Außerdem erhalten Sie wertvolle Informationen zu diesen Themen:\n\nWie ein CIAM-System Sie bei der Implementierung progressiver Profilerstellung und Nutzung von Zero-Party-Daten unterstützt\nMöglichkeiten zur vollständigen Absicherung Ihrer Kundendaten mit Schutz vor Bot-Angriffen, MFA und der Erkennung kompromittierter Passwörter\nWie Sie die Account-Erstellung und nachfolgende Logins für Kunden so reibungslos und angenehm wie möglich machen","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"52MZflCyUxepxMb4FNrY1g","type":"Asset","createdAt":"2025-03-25T13:24:51.909Z","updatedAt":"2025-03-25T13:24:51.909Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Improving User Experiences with CIAM - DE Placeholder (1)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/52MZflCyUxepxMb4FNrY1g/10fd9a4e9c23559da915882faba9676b/Improving_User_Experiences_with_CIAM_-_DE_Placeholder__1_.jpg","details":{"size":85994,"image":{"width":1600,"height":840}},"fileName":"Improving User Experiences with CIAM - DE Placeholder (1).jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3iAiPaQMgEBnaEueJdA9F1","type":"Asset","createdAt":"2025-03-21T11:17:21.930Z","updatedAt":"2025-03-21T11:17:21.930Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 3 Auth0 Final de","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3iAiPaQMgEBnaEueJdA9F1/f906109216bdb581e00b804a6dd86056/Okta_Ebook_Asset_3_Auth0_Final_de.pdf","details":{"size":964414},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_de.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. Einführung `2`\n2. Was ist CIAM? `3`\n3. Warum ist CIAM wichtig? `4`\n4. Der CIAM-Ansatz von Auth0 `4`\n5. Nahtlose Anmelde- und Login-Prozesse `5`\n6. Verbesserte Personalisierung mit CIAM-Daten `8`\n7. Sicherheit vs. User Experience – wie CIAM beides verbessert `11`\n8. CIAM unterstützt Entwickler bei der Nutzung von GenAI für User Experiences `12`\n9. Fazit `13`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"DYtNH0C0lX2XotlALgPkP","type":"Entry","createdAt":"2025-03-21T11:18:57.901Z","updatedAt":"2025-03-21T11:18:57.901Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001YyUfAAK-aPA4z000000kA4nGAE"},{"type":"ebooks","updatedAt":"2025-03-25T13:21:10.581Z","title":"CIAMでUXをさらに魅力的に | Auth0","id":"jp-improving-user-experiences-with-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4GpA79ve64IC24rzr9sQwz","type":"Asset","createdAt":"2025-03-25T10:37:01.004Z","updatedAt":"2025-03-25T10:37:01.004Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 3 Auth0 Final jp","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4GpA79ve64IC24rzr9sQwz/e7a48197459d0e477e312ec750d683a4/Okta_Ebook_Asset_3_Auth0_Final_jp.png","details":{"size":174824,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_jp.png","contentType":"image/png"}}},"description":"顧客の獲得と維持においては、小さな優位性が大きな差を生みます。\n\nこの資料では、カスタマーアイデンティティを効果的に管理する方法をご紹介します。今すぐダウンロードしてご確認ください。\n\nCIAMを活用してプログレッシブプロファイリングを実装し、ゼロパーティデータ(ZPD)を最大限に活用する方法\nボット対策、MFA、漏洩パスワードの検知を活用し、顧客のデータをシームレスに保護する方法\nアカウント作成とその後のログインを、顧客にとってできる限りスムーズで快適にする方法","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1OUlqufAsBfEzmCCMpjK0I","type":"Asset","createdAt":"2025-03-21T11:11:21.825Z","updatedAt":"2025-03-21T11:11:21.825Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Improving User Experiences with CIAM Share card JP","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1OUlqufAsBfEzmCCMpjK0I/39e414c531c89978858bf7fac7786dca/Improving_User_Experiences_with_CIAM_-_JP_Placeholder.jpg","details":{"size":78148,"image":{"width":1600,"height":840}},"fileName":"Improving User Experiences with CIAM - JP Placeholder.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3OcwTkiFhzegIQRnuo9AOR","type":"Asset","createdAt":"2025-03-21T11:12:39.925Z","updatedAt":"2025-03-21T11:12:39.925Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"jp-improving-user-experiences-with-ciam JP Ebook","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3OcwTkiFhzegIQRnuo9AOR/63dc61a83278ba3e2bb2680f212d3a59/Okta_Ebook_Asset_3_Auth0_Final_jp.pdf","details":{"size":9473442},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_jp.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. はじめに `2`\n2. CIAM とは? `3`\n3. なぜ CIAM が重要なのか? `4`\n4. Auth0 独自の CIAM アプローチ `4`\n5. シームレスなサインアップとログイン `5`\n6. CIAM データでパーソナライゼーションを強化 `8`\n7. CIAM によるセキュリティとエクスペリエンスの両立 `11`\n8. UX と生成 AI の統合を CIAM が支援 `12`\n9. おわりに `13`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1HupHUHRpzxpiBmHLk8snS","type":"Entry","createdAt":"2025-03-21T11:14:22.102Z","updatedAt":"2025-03-21T11:14:22.102Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001YyUiAAK-aPA4z000000kA4pGAE"},{"type":"ebooks","updatedAt":"2025-03-25T13:18:43.693Z","title":"Créer et faire évoluer votre produit plus vite | Auth0","id":"fr-accelerate-innovation-through-identity-management-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6YjhKOiZZ1QQgVqvZCpP6F","type":"Asset","createdAt":"2025-03-25T10:35:38.528Z","updatedAt":"2025-03-25T10:35:38.528Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 5 Auth0 Final fr","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6YjhKOiZZ1QQgVqvZCpP6F/7617c64e9f2b8c7ad4b097452fdc8400/Okta_Ebook_Asset_5_Auth0_Final_fr.png","details":{"size":111538,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_fr.png","contentType":"image/png"}}},"description":"À l’époque actuelle, les entreprises n’ont pas le temps de prendre le temps. À peine avez-vous amélioré votre fabuleuse expérience utilisateur qu’un concurrent a déjà relevé le niveau et s’est approprié vos clients potentiels.\n\nCet article explique comment une plateforme CIAM peut vous aider à garder une longueur d’avance :\n\nStratégies claires et concrètes pour accélérer le développement et l’évolution de vos produits\nConseils pour rationaliser l’onboarding client et optimiser l’expérience globale\nComment l’identité client peut vous aider à renforcer votre sécurité et votre conformité","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ILJVFCdDJqLSUaD5ivp8e","type":"Asset","createdAt":"2025-03-21T10:59:27.267Z","updatedAt":"2025-03-21T10:59:27.267Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Accelerating Success: Build and Scale Market-Leading Products Faster FR Share card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ILJVFCdDJqLSUaD5ivp8e/9ee0f6c610588812e4cb451af833f4ba/Accelerating_Success__Build_and_Scale_Market-Leading_Products_Faster_-_FR_Placeholder.jpg","details":{"size":105566,"image":{"width":1600,"height":840}},"fileName":"Accelerating Success_ Build and Scale Market-Leading Products Faster - FR Placeholder.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Ebd0mCliHPqPmlPJWF0L5","type":"Asset","createdAt":"2025-03-21T11:00:45.306Z","updatedAt":"2025-03-21T11:00:45.306Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"fr-accelerate-innovation-through-identity-management-infographic","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3Ebd0mCliHPqPmlPJWF0L5/a5ec35e92676bb5a5b759c8c5670e50a/Okta_Ebook_Asset_5_Auth0_Final_fr.pdf","details":{"size":1008384},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_fr.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. Une expérience client conforme aux attentes dans un marché dynamique `2`\n2. Opportunités pour les équipes produits `4`\n3. Valeur apportée par Auth0 aux équipes produits et développement `10`\n4. Conclusion `12`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6tccmZ0P5hGlCKLFgrlkSS","type":"Entry","createdAt":"2025-03-21T11:01:50.825Z","updatedAt":"2025-03-21T11:01:50.825Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001YyUlAAK-aPA4z000000kA4sGAE"},{"type":"ebooks","updatedAt":"2025-03-25T13:17:34.413Z","title":"Produkte schneller aufbauen und skalieren | Auth0","id":"de-accelerate-innovation-through-identity-management-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ZJ9tUCmBup1S8Rcq1zka8","type":"Asset","createdAt":"2025-03-25T10:35:16.106Z","updatedAt":"2025-03-25T10:35:16.106Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 5 Auth0 Final de","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ZJ9tUCmBup1S8Rcq1zka8/b07afd2f125188cdecb5e9e3ef9a889d/Okta_Ebook_Asset_5_Auth0_Final_de.png","details":{"size":104687,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_de.png","contentType":"image/png"}}},"description":"Leider kann man es sich heute nicht mehr leisten, sich Zeit zu nehmen. Bis Sie Ihre neue User Experience optimiert haben, hat sich die Konkurrenz längst Ihre potenziellen Kunden geschnappt.\n\nIn diesem Whitepaper erfahren Sie, wie Sie dem Markt mit einer CIAM-Plattform einen Schritt voraus bleiben können:\n\nKlare, umsetzbare Strategien zur schnelleren Entwicklung und Skalierung Ihrer Produkte\nTipps zum Optimieren des Kunden-Onboardings und Verbessern der allgemeinen Customer Experience\nWie eine Customer Identity-Lösung die Sicherheit und Compliance verbessern kann","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2c34x6egFgexrJbrtZR8mh","type":"Asset","createdAt":"2025-03-21T10:55:03.110Z","updatedAt":"2025-03-21T10:55:03.110Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Accelerating Success: Build and Scale Market-Leading Products Faster DE Share card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2c34x6egFgexrJbrtZR8mh/898695a38918c8aaf8e87c2f9c0cd011/Accelerating_Success__Build_and_Scale_Market-Leading_Products_Faster_-_DE_Placeholder.jpg","details":{"size":100577,"image":{"width":1600,"height":840}},"fileName":"Accelerating Success_ Build and Scale Market-Leading Products Faster - DE Placeholder.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5YDmMikiZxqIFxPVjwcr6c","type":"Asset","createdAt":"2025-03-21T10:56:18.355Z","updatedAt":"2025-03-21T10:56:18.355Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Accelerating Success: Build and Scale Market-Leading Products Faster Ebook DE","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5YDmMikiZxqIFxPVjwcr6c/8ab636da9a29dc2e7c16af83d125f05b/Okta_Ebook_Asset_5_Auth0_Final_de.pdf","details":{"size":1006141},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_de.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. Bessere Customer Experiences für einen dynamischen Markt `2`\n2. Business-Chancen für Produkt eams `4`\n3. Vorteile von Auth0 für Entwicklungs- und Produkteams `10`\n4. Abschließende Überlegungen `12`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5s09zV1XZTG07cdw6c2GE5","type":"Entry","createdAt":"2025-03-21T10:57:24.295Z","updatedAt":"2025-03-21T10:57:24.295Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001YyUkAAK-aPA4z000000kA4rGAE"},{"type":"ebooks","updatedAt":"2025-03-25T12:59:43.217Z","title":"製品の開発と拡張を加速 | Auth0","id":"jp-accelerate-innovation-through-identity-management-infographic","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4YmjJsW29GCL3GDwNSJiyI","type":"Asset","createdAt":"2025-03-21T12:22:40.433Z","updatedAt":"2025-03-25T10:34:35.042Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"Okta Ebook Asset 5 Auth0 Final jp","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4YmjJsW29GCL3GDwNSJiyI/98ad99292ca751c0e697bd9597c02379/Okta_Ebook_Asset_5_Auth0_Final_jp.png","details":{"size":148586,"image":{"width":600,"height":848}},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_jp.png","contentType":"image/png"}}},"description":"残念ながら、競争が激化する今の時代、悠長に構えている余裕はありません。どれだけ新しく素晴らしいUXを作っても、その間に競合に先を越されて見込み顧客を奪われてしまいます。\n\nこの記事では、競争で一歩先を行くためにCIAMプラットフォームがどのように役立つのかを解説します。\n\n製品の開発と拡張を加速するための、具体的かつ実践的な戦略\n顧客のオンボーディングを効率化し、エクスペリエンス全体を向上させるためのヒント\nセキュリティとコンプライアンスを確保する上でのカスタマーアイデンティティの重要性","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1RUg9OF7WZWQkTME69KRps","type":"Asset","createdAt":"2025-03-21T10:53:15.793Z","updatedAt":"2025-03-21T10:53:15.793Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Accelerating Success: Build and Scale Market-Leading Products Faster JP Share card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1RUg9OF7WZWQkTME69KRps/41a17ecac58649df427a47c57ec4068c/Accelerating_Success__Build_and_Scale_Market-Leading_Products_Faster_-_JP_Placeholder.jpg","details":{"size":91968,"image":{"width":1600,"height":840}},"fileName":"Accelerating Success_ Build and Scale Market-Leading Products Faster - JP Placeholder.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4TnmE4AEg2jArUTBBhbZl9","type":"Asset","createdAt":"2025-03-21T10:50:05.687Z","updatedAt":"2025-03-21T10:50:05.687Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Accelerating Success: Build and Scale Market-Leading Products Faster Ebook JP","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/4TnmE4AEg2jArUTBBhbZl9/b6760cef6e385125686797069f36f9ad/Okta_Ebook_Asset_5_Auth0_Final_jp.pdf","details":{"size":11882588},"fileName":"Okta_Ebook_Asset_5_Auth0_Final_jp.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. 変化の激しい市場におけるカスタマーエクスペリエンスの提供 `2`\n2. 製品チームにとってのビジネス機会 `4`\n3. Auth0 が開発 / 製品チームにもたらす価値 `10`\n4. 最後に `12`\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"67fUpcPVdbMbsGlVwpcK59","type":"Entry","createdAt":"2025-03-21T10:51:52.158Z","updatedAt":"2025-03-21T10:51:52.158Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001YyUmAAK-aPA4z000000kA4tGAE"},{"type":"ebooks","updatedAt":"2025-03-20T15:45:33.025Z","title":"Vorteile von Auth0 | Auth0","id":"de-why-auth0-by-okta","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4Y8K5lH1bMD1YhasgTPiE0","type":"Asset","createdAt":"2025-03-19T14:27:55.859Z","updatedAt":"2025-03-20T15:44:30.017Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"thumbnail why auth0 de","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4Y8K5lH1bMD1YhasgTPiE0/7ac9f9689ba6618458f846a645f9dbd5/Group_1000002941.png","details":{"size":343699,"image":{"width":600,"height":856}},"fileName":"Group 1000002941.png","contentType":"image/png"}}},"description":"Customer Identity and Access Management (CIAM) gilt mittlerweile zu Recht als die beste Wahl für große und kleine B2B- und B2C-Unternehmen, die ihr Wachstum beschleunigen, die Time-to-Market verkürzen, die Einhaltung von Compliance-Richtlinien gewährleisten und wertvolle Kundendaten auf zulässige Weise gewinnen möchten. Unabhängig davon, ob Sie einen Identity-Stack intern entwickeln oder eine Cloud-basierte CIAM-Lösung in Ihre Anwendungen integrieren möchten, sollten Sie eine fundierte Entscheidung treffen, die im besten Sinne Ihrer Kunden ist. Dieses E-Book deckt folgende Themen ab:\n\nCrash-Kurs zu Customer Identity (Hinweis: es gibt viel mehr darüber zu wissen, als selbst den meisten Technologie-Experten bewusst ist)\nVorteile der Integration einer externen CIAM-Lösung in Ihre Anwendung oder Ihren Service – schnellere Bereitstellung, kosteneffizientere Umsetzung für Ihr Unternehmen und ein Identity-Stack, der sicherer, stabilerer und zukunftssicherer ist als eine intern entwickelte Lösung","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lWe4fEJD35nPj3TYduXJg","type":"Asset","createdAt":"2025-03-19T09:15:34.931Z","updatedAt":"2025-03-19T09:15:34.931Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"de-why-auth0-share-card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lWe4fEJD35nPj3TYduXJg/560ab69d6957e8cb3e357e880bc48f74/resource-share-card_DE.png","details":{"size":460218,"image":{"width":1600,"height":840}},"fileName":"resource-share-card_DE.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6mJ6DsTxvv92NTyn8F1qD2","type":"Asset","createdAt":"2025-03-19T09:18:13.356Z","updatedAt":"2025-03-19T09:18:13.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"PDF Ebook DE why-auth0-by-okta","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6mJ6DsTxvv92NTyn8F1qD2/bee973a9b3d7fa4622ab185e6aa993a7/WhyAuth0byOkta_eBook_030624_Final_de-DE.pdf","details":{"size":2748005},"fileName":"WhyAuth0byOkta_eBook_030624_Final_de-DE.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"1. Einführung `2`\n2. Customer Identity-Lösungen sind tückisch komplex, entwickeln sich dynamisch weiter und werden ständig angegriffen `3`\n3. Die Implementierung von CIAM ist ein langfristiger Prozess `6`\n4. Identity hat viele Stakeholder `7`\n5. Verschiedene Kunden wollen verschiedene Dinge `8`\n6. Identity kann Kompromisse zwischen User Experience, Sicherheit und Datenschutz erfordern `10`\n7. Warum nutzen kleine und große Unternehmen Auth0? `15`\n8. Bewährte Ergebnisse für Unternehmen wie Ihres `20`\n9. Haftungsausschluss `21`","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5PWNIZjwG9U00HhltA1T7D","type":"Entry","createdAt":"2025-03-19T09:18:53.696Z","updatedAt":"2025-03-19T09:18:53.696Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001YyUbAAK-aPA4z000000k9kUGAQ"},{"type":"ebooks","updatedAt":"2025-03-20T15:43:24.271Z","title":"Auth0を選ぶ理由 | Auth0","id":"jp-why-auth0-by-okta","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2C2icuFyXziEHqEEtBF1Ct","type":"Asset","createdAt":"2025-03-19T14:29:29.811Z","updatedAt":"2025-03-20T15:41:28.640Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"why-auth0-by-okta jp","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2C2icuFyXziEHqEEtBF1Ct/f571eed2cfdbcaa7f8a3c0499b1b7bea/Group_1000002940.png","details":{"size":346381,"image":{"width":600,"height":856}},"fileName":"Group 1000002940.png","contentType":"image/png"}}},"description":"今では、B2BかB2Cかを問わず、あらゆる規模の企業にとって、カスタマーアイデンティティおよびアクセス管理(CIAM)が成長を促進し、市場投入までの時間を短縮し、規制遵守を達成し、貴重な顧客データを適切に取得する手段であることが正しく認識されるようになりました。最終的に、独自のアイデンティティスタックを社内構築するか、クラウドベースのCIAMソリューションをアプリケーションに統合するかに関わらず、どの組織もユーザーにとって最適な選択を十分な情報をもとに判断できることが重要です。このガイドをダウンロードして、以下のポイントをご確認ください。\n\nカスタマーアイデンティティの基礎を短時間で理解(テクノロジー専門家が一般的に認識している以上に、これは奥深い領域です)\nサードパーティのCIAMソリューションをアプリやサービスに統合することで、自社開発よりも迅速かつコスト効率に優れ、より安全で安定し、将来性のあるアイデンティティスタックを実現できます。その理由をご紹介します。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6qUyt90jplOAK91BINLROL","type":"Asset","createdAt":"2025-03-19T09:03:31.253Z","updatedAt":"2025-03-19T09:03:31.253Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"jp-why-auth0-share-card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6qUyt90jplOAK91BINLROL/cedbfe97a67e48978ccfbf531267c108/resource-share-card.png","details":{"size":463345,"image":{"width":1600,"height":840}},"fileName":"resource-share-card.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2VawPahqiUUaHWCKwxUbmo","type":"Asset","createdAt":"2025-03-19T09:05:36.949Z","updatedAt":"2025-03-19T09:05:59.938Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"PDF Ebook JP why-auth0","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2VawPahqiUUaHWCKwxUbmo/2f50466936e6136633fac20142a1b703/Okta_Ebook_Asset_3_Auth0_Final_jp.pdf","details":{"size":9473442},"fileName":"Okta_Ebook_Asset_3_Auth0_Final_jp.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"2 はじめに\n3 CIAM とは?\n4 なぜ CIAM が重要なのか?\n4 Auth0 独自の CIAM アプローチ\n5 シームレスなサインアップとログイン\n8 CIAM データでパーソナライゼーションを強化\n11 CIAM によるセキュリティとエクスペリエンスの両立\n12 UX と生成 AI の統合を CIAM が支援\n13 おわりに","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XwnCh7TpGvGmZvbkUWOA4","type":"Entry","createdAt":"2025-03-19T09:08:45.900Z","updatedAt":"2025-03-19T09:08:45.900Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001YyUdAAK-aPA4z000000k9kWGAQ"},{"type":"ebooks","updatedAt":"2025-03-20T15:40:24.015Z","title":"Pourquoi Auth0 ? | Auth0","id":"fr-why-auth0-by-okta","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"465pwg0uqqUXSn1wiJ03Gy","type":"Asset","createdAt":"2025-03-19T14:28:54.792Z","updatedAt":"2025-03-20T15:38:28.251Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":5,"locale":"en-US"},"fields":{"title":"why-auth0-by-okta fr","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/465pwg0uqqUXSn1wiJ03Gy/c5377de87b9fe12258c8f298eba2f19a/Group_1000002939.png","details":{"size":346531,"image":{"width":600,"height":856}},"fileName":"Group 1000002939.png","contentType":"image/png"}}},"description":"La gestion des identités et des accès clients (CIAM) est désormais considérée à juste titre comme un moyen pour les entreprises B2B et B2C, petites ou grandes, de doper la croissance, de réduire les délais de lancement, de respecter les impératifs de conformité réglementaire et d’acquérir de façon responsable de précieuses données sur les clients. Que vous décidiez de créer une pile de l’identité en interne ou que vous optiez pour l’intégration d’une solution cloud CIAM dans vos applications, notre souhait est de vous voir prendre les bonnes décisions pour vos utilisateurs. Téléchargez ce guide pour :\n\nBénéficier d’un cours intensif sur l’identité client (dont la portée est bien plus grande que ne le pensent même les pros des technologies)\nDécouvrir pourquoi l’intégration d’une solution CIAM tierce à votre application ou service est plus rapide et plus rentable pour votre entreprise, et lui offre une pile de l’identité plus stable, sécurisée et durable qu’une solution développée en interne","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5w3GrZuP5mEaAIhrROYxEp","type":"Asset","createdAt":"2025-03-19T09:22:52.025Z","updatedAt":"2025-03-19T09:22:52.025Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"fr-why-auth0-share-card","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5w3GrZuP5mEaAIhrROYxEp/89669e9391811b3ef21a352e0e3d68a6/resource-share-card_FR.png","details":{"size":460100,"image":{"width":1600,"height":840}},"fileName":"resource-share-card_FR.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5m0MXOmpWw4UUeL5oIvSxc","type":"Asset","createdAt":"2025-03-19T09:23:53.223Z","updatedAt":"2025-03-19T09:24:34.720Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"PDF Ebook FR Why-auth0","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5m0MXOmpWw4UUeL5oIvSxc/4070663a231c7e572f2cca44a09797f2/WhyAuth0byOkta_eBook_030624_Final_fr-FR.pdf","details":{"size":2750491},"fileName":"WhyAuth0byOkta_eBook_030624_Final_fr-FR.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"\n1. Introduction `2`\n2. L’identité client est complexe, évolue constamment et fait l’objet d’attaques incessantes `3`\n3. L’implémentation d’un CIAM est un long parcours `6`\n4. L’identité intéresse de nombreuses parties prenantes `7`\n5. Les attentes des clients varient `8`\n6. L’identité peut contraindre à des choix difficiles entre expérience utilisateur, sécurité et confidentialité `10`\n7. Pourquoi les organisations, petites et grandes, adoptent-elles Auth0 ? `15`\n8. Des résultats éprouvés pour des entreprises comme la vôtre `20`\n9. Clause de non- responsabilité `21`\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7iNFlCBcpIRdzdAA0ZRjRZ","type":"Entry","createdAt":"2025-03-19T09:24:15.400Z","updatedAt":"2025-03-19T09:24:15.400Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001YyUcAAK-aPA4z000000k9kVGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:17:32.244Z","title":"OAuth2 e OpenID Connect: Guia Profissional","id":"open-id-connect-pt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6ANfXbhKL7cbAcZwHPTTFT","type":"Asset","createdAt":"2022-03-10T19:29:55.141Z","updatedAt":"2022-03-10T19:29:55.141Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 e OpenID Connect: o Guia Profissional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6ANfXbhKL7cbAcZwHPTTFT/c7f38f7ea56d53cf92b8e7c8da4fa04c/OAuth2_and_OpenID_Connect_625x892px_2.jpg","details":{"size":144650,"image":{"width":600,"height":856}},"fileName":"OAuth2 and OpenID Connect_625x892px_2.jpg","contentType":"image/jpeg"}}},"description":"A autenticação e a autorização são partes críticas de qualquer aplicativo. Elas evoluíram ao longo dos anos para atender aos requisitos desafiadores da Web moderna. O OAuth2 e o OpenID Connect oferecem uma estrutura para tratá-las de maneira eficaz. \n\nAprenda as melhores práticas no uso de ambos os padrões em diferentes cenários e tipos de aplicativos. Este e-book explicará tudo o que você precisa saber sobre o OAuth2 e o OpenID Connect.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4lwkABiGduD6RDfZ6UXEzw","type":"Asset","createdAt":"2022-03-10T19:30:50.508Z","updatedAt":"2022-03-10T19:30:50.508Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 e OpenID Connect: o Guia Profissional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4lwkABiGduD6RDfZ6UXEzw/3fcfc655ebe629e31d53546c8b55a7eb/0Auth2OpenIdConnect-URLimage_PT.jpeg","details":{"size":1089583,"image":{"width":5000,"height":2432}},"fileName":"0Auth2OpenIdConnect-URLimage_PT.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"50enOoeyjvmbp9nU2JG686","type":"Asset","createdAt":"2022-03-10T19:31:22.368Z","updatedAt":"2022-03-10T19:31:22.368Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 e OpenID Connect: o Guia Profissional","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/50enOoeyjvmbp9nU2JG686/821fbec6ebba0b508097027ea640f1d1/Auth0-eBook-2022-03-OAuth2_OpenID_Connect_The_Professional_Guide_PTBR.pdf","details":{"size":4495459},"fileName":"Auth0-eBook-2022-03-OAuth2_OpenID_Connect_The_Professional_Guide_PTBR.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Este e-book explicará tudo o que você precisa saber sobre o OAuth2 e o OpenID Connect.","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"PT","ocid":"7014z000001cb1MAAQ-aPA4z000000011LGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:16:36.604Z","title":"Autenticação após senhas","id":"auth-after-passwords-pt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31gazXbRVxgxfabL6FjJuB","type":"Asset","createdAt":"2022-05-26T20:06:19.157Z","updatedAt":"2022-05-26T20:06:46.365Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Autenticação após senhas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31gazXbRVxgxfabL6FjJuB/b806d9b8e981c486c7a504ed9be783fd/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v2_-_PT_Cover_625x892.png","details":{"size":96786,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v2 - PT Cover_625x892.png","contentType":"image/png"}}},"description":"Desde melhorar a experiência do cliente por meio do login único (SSO) até tornar a autenticação multifator (MFA) rápida e fácil, sua caixa de login precisa encontrar o equilíbrio certo entre a conveniência, a segurança e a privacidade do usuário.\n\nDe fato, acreditamos que as empresas que terão sucesso nos próximos cinco anos serão as mais bem equipadas para atender às crescentes expectativas do consumidor para esses três atributos. Mas como será esse futuro e por qual caminho as empresas de hoje podem se tornar os líderes de amanhã?\n\nNeste ebook, responderemos a essas perguntas e analisaremos mais a fundo o futuro da autenticação e os impactos do passwordless.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2IIUAuaw7ScIZKyfhBjf7t","type":"Asset","createdAt":"2022-05-26T20:07:19.982Z","updatedAt":"2022-05-26T20:07:19.982Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticação após senhas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2IIUAuaw7ScIZKyfhBjf7t/b03052378ab1077eee821b15ee7269b3/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v2_-_PT_SM.png","details":{"size":1221505,"image":{"width":10417,"height":5067}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v2 - PT SM.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3QathO6GhmqBoxKDMnD79F","type":"Asset","createdAt":"2022-05-26T20:09:12.703Z","updatedAt":"2022-05-26T20:09:12.703Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticação após senhas","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3QathO6GhmqBoxKDMnD79F/427f7fb90c3457c4d2051b1a6291122a/Authentication-After-Passwords-PT.pdf","details":{"size":566397},"fileName":"Authentication-After-Passwords-PT.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- Apresentação\n- O futuro da identidade\n- A necessidade do acesso sem atrito\n- Fluxos de identidade são elementos fundamentais da jornada do cliente\n- O que vem primeiro: Autenticação Passwordless\n- O roteiro do acesso sem login\n- Resumo\n- O que você pode fazer agora","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"PT","ocid":"7014z000001cb75AAA-aPA4z000000015JGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:15:54.573Z","title":"Manual do JWT","id":"jwt-handbook-pt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1VOpYe0Io4I2plznGbOdpI","type":"Asset","createdAt":"2022-03-07T21:49:31.579Z","updatedAt":"2022-03-14T22:59:58.219Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"Manual do JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1VOpYe0Io4I2plznGbOdpI/8db1a7b4412c04e42acbf1b2fd013fc0/JWT_Handbook_625x892px_FInal.jpg","details":{"size":110845,"image":{"width":600,"height":856}},"fileName":"JWT Handbook_625x892px_FInal.jpg","contentType":"image/jpeg"}}},"description":"Já se perguntou como o JWT surgiu e quais problemas foi projetado para resolver? Você tem curiosidade sobre a infinidade de algoritmos disponíveis para assinar e fazer o encrypt de JWTs? Ou você tem interesse em começar a usar os JWTs o mais rápido possível?\n\nEntão este manual é para você.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1XDfLUo96cqeO4P9CoyE4L","type":"Asset","createdAt":"2022-03-15T16:38:34.844Z","updatedAt":"2022-03-15T16:38:34.844Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Manual do JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1XDfLUo96cqeO4P9CoyE4L/f5a7f7dca7eb14f2ae7705edee4c223b/-Share_Asset-_Guide__Horizontal___6_.jpeg","details":{"size":115308,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Guide (Horizontal) (6).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1IYrCeu9wHw8G0OtxgDFtZ","type":"Asset","createdAt":"2022-03-14T23:02:12.629Z","updatedAt":"2022-03-14T23:02:12.629Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Manual do JWT","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/1IYrCeu9wHw8G0OtxgDFtZ/5add208c70a0c0aa1bf45bcaf44c900b/Auth0_JWT_Handbook_PTBR.pdf","details":{"size":3150973},"fileName":"Auth0_JWT Handbook_PTBR.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Agradecimentos especiais\n\nCapítulo 1\nIntrodução\n1.1 O que é um JSON Web Token?\n1.2 Que problema ele resolve?\n1.3 Um pouco de história\n\nCapítulo 2\nAplicações práticas\n2.1 Sessões do lado do cliente/sem estado\n2.1.1 Considerações de segurança\n2.1.1.1 Remoção de assinatura\n2.1.1.2 Falsificação de solicitação entre sites (CSRF)\n2.1.1.3 Cross-site Scripting (XSS)\n2.1.2 As sessões do lado do cliente são úteis?\n2.1.3 Exemplo\n2.2 Identidade federada\n2.2.1 Tokens de acesso e atualização\n2.2.2 JWTs e OAuth2\n2.2.3 JWTs e OpenID Connect\n2.2.3.1 Fluxos OpenID Connect e JWTs\n2.2.4 Exemplo\n\nCapítulo 3\nJSON Web Tokens em detalhes\n3.1 O header\n3.2 O payload\n3.2.1 Claims registrados\n3.2.2 Claims públicos e privados\n3.3 JWTs não protegidos\n3.4 Criação de um JWT não protegido\n3.4.1 Código de exemplo\n3.5 Análise de um JWT não protegido\n3.5.1 Código de exemplo\n\nCapítulo 4\nJSON Web Signatures\n4.1 Estrutura de um JWT assinado\n4.1.1 Visão geral do algoritmo para serialização compacta\n4.1.2 Aspectos práticos de algoritmos de assinatura\n4.1.3 Claims do header do JWS\n4.1.4 Serialização JWS JSON\n4.1.4.1 Serialização JSON do JWS achatada\n4.2 Assinatura e validação de tokens\n4.2.1 HS256: HMAC + SHA-256\n4.2.2 RS256: RSASSA + SHA256\n4.2.3 ES256: ECDSA usando P-256 e SHA-256\n\nCapítulo 5\nJSON Web Encryption (JWE)\n5.1 Estrutura de um JWT criptografado\n5.1.1 Algoritmos de criptografia de chave\n5.1.1.1 Modos de gerenciamento de chaves\n5.1.1.2 Chave de criptografia de conteúdo (CEK) e chave de criptografia JWE\n5.1.2 Algoritmos de criptografia de conteúdo\n5.1.3 O header\n5.1.4 Visão geral do algoritmo para serialização compacta\n5.1.5.1 Serialização JSON do JWE achatada\n5.2 Criptografia e descriptografia de tokens\n5.2.1 Introdução: gerenciamento de chaves com node-jose\n5.2.2 AES-128 Key Wrap (Chave) + AES-128 GCM (Conteúdo)\n5.2.3 RSAES-OAEP (Chave) + AES-128 CBC + SHA-256 (Conteúdo)\n5.2.4 ECDH-ES P-256 (Chave) + AES-128 GCM (Conteúdo)\n5.2.5 JWT aninhado: ECDSA usando P-256 e SHA-256 (assinatura) + RSAES-OAEP (chave criptografada) + AES-128 CBC + SHA-256 (conteúdo criptografado)\n5.2.6 Descriptografia\n\nCapítulo 6\nJSON Web Keys (JWK)\n6.1 Estrutura de um JSON Web Key\n6.1.1 JSON Web Key Set\nCapítulo 7\nAlgoritmos JSON Web\n7.1 Algoritmos gerais\n7.1.1 Base64\n7.1.1.1 Base64-URL\n7.1.1.2 Código de exemplo\n7.1.2 SHA\n7.2 Algoritmos de assinatura\n7.2.1 HMAC\n7.2.1.1 HMAC + SHA256 (HS256)\n7.2.2 RSA Figura 7.4: Expressão básica do RSA\n7.2.2.1 Escolha de e, d e n Figura 7.5: Simetria entre e e d\n7.2.2.2 Assinatura básica\n7.2.2.3 RS256:  RSASSA PKCS1 v1.5 usando SHA-256\n7.2.2.3.1 Algoritmo\n7.2.2.3.1.1 Primitiva EMSA-PKCS1-v1_5\n7.2.2.3.1.2 Primitiva OS2IP Figura 7.7: Resultado da OS2IP\n7.2.2.3.1.3 Primitiva RSASP1 Figura 7.8: Resultado de RSASP1\n7.2.2.3.1.4 Primitiva RSAVP1 Figura 7.9: Resultado de RSAVP1\n7.2.2.3.1.5 Primitiva I2OSP Figura 7.10: Decomposição de I2OSP\n7.2.2.3.2 Código de exemplo\n7.2.2.4 PS256: RSASSA-PSS usando SHA-256 e MGF1 com SHA-256\n7.2.2.4.1 Algoritmo\n7.2.2.4.1.1 MGF1: a função de geração de máscara\n7.2.2.4.1.2 Primitiva EMSA-PSS-ENCODE\n7.2.2.4.1.3 Primitiva EMSA-PSS-VERIFY\n7.2.2.4.2 Código de exemplo\n7.2.3 Curva elíptica Figura 7.11: Equação da curva elíptica Figura 7.13: Função exponencial\n7.2.3.1  Aritmética da curva elíptica\n7.2.3.1.1 Adição de pontos Figura 7.14: Adição de pontos\n7.2.3.1.2 Duplicação de pontos Figura 7.15: Duplicação de pontos\n7.2.3.1.3 Multiplicação escalar Figura 7.16: Multiplicação escalar\n7.2.3.2 Algoritmo de assinatura digital de curva elíptica (ECDSA)\n7.2.3.2.1 Parâmetros de domínio de curva elíptica\n7.2.3.2.2 Chaves públicas e privadas\n7.2.3.2.2.1 O problema do logaritmo discreto Figura 7.17: Chave privada como o logaritmo da chave pública\n7.2.3.2.3 ES256:  ECDSA usando P-256 e SHA-256 Figura 7.18: s\n7.3 Atualizações futuras\n\nCapítulo 8\nAnexo A. Práticas recomendadas atuais\n8.1 Armadilhas e ataques comuns\n8.1.1 Ataque “alg:  none”\n8.1.2 Ataque de chave pública RS256 como segredo HS256\n8.1.3 Chaves HMAC fracas\n8.1.4 Pressuposições erradas de verificação empilhada de criptograf + assinatura\n8.1.5 Ataques de curva elíptica inválida\n8.1.6 Ataques de substituição\n8.1.6.1 Destinatário diferente\n8.1.6.2 Mesmo destinatário/JWT cruzado\n8.2 Mitigações e práticas recomendadas\n8.2.1 Executar sempre a verificação de algoritmo\n8.2.2 Usar algoritmos adequados\n8.2.3  Sempre realizar todas as validações\n8.2.4  Sempre validar as entradas criptográficas\n8.2.5  Escolher chaves fortes\n8.2.6 Validar todos os claims possíveis\n8.2.7 Usar o claim typ para separar tipos de tokens\n8.2.8 Usar regras de validação diferentes para cada token\n8.3 Conclusão","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"PT","ocid":"7014z000001cb0WAAQ-aPA4z000000010oGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:15:00.714Z","title":"Infográfico: Os 3 principais ataques que ameaçam a segurança","id":"state-of-secure-identity-infographic-pt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"NurIk7rcHXJETyCFB9m5Z","type":"Asset","createdAt":"2021-11-20T00:49:00.695Z","updatedAt":"2022-03-12T00:40:22.966Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Infográfico: Três tipos principais de ataques","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/NurIk7rcHXJETyCFB9m5Z/2359624c5a361b2ac65cb65ee9c6defc/-Landing_Page-_3Attacks_-_BRPT__625x892px_.jpeg","details":{"size":182862,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - BRPT (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Lançado como parte do primeiro [relatório Estado da Identidade Segura](https://auth0.com/resources/whitepapers/state-of-secure-identity-report-pt) da Auth0, este infográfico revela os 3 principais ataques que ameaçam a segurança das identidades.\n\nLançado em junho de 2021, o Relatório Estado da Identidade Segura da Auth0 revela insights das nossas próprias tendências e análises para ajudar a definir o espaço de segurança da identidade, explicar as novas ameaças e fornecer estratégias concretas para mitigação.\n\nPara uma análise mais aprofundada, leia o [relatório Estado da Identidade Segura](https://auth0.com/resources/whitepapers/state-of-secure-identity-report-pt) completo e saiba mais sobre:\n- Preenchimento de credenciais\n- Ataques de injeção\n- Criação de contas falsas\n- Ataques de desvio de MFA\n- Medidas defensivas sendo adotadas para combater esses ataques","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3u2QSEErxjFP9rJAZX543P","type":"Asset","createdAt":"2021-11-20T00:49:28.497Z","updatedAt":"2022-03-12T00:38:54.532Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"en-US"},"fields":{"title":"Infográfico: Três tipos principais de ataques","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3u2QSEErxjFP9rJAZX543P/295a48ab038cb9930923697b57ba8c62/-Share_Asset-_3Attacks_-_BRPT__Horizontal_.jpeg","details":{"size":107436,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- 3Attacks - BRPT (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"65Hh6sOJXPxkqgFApZr1MR","type":"Asset","createdAt":"2021-11-20T00:54:49.861Z","updatedAt":"2021-11-20T00:54:49.861Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Três tipos principais de ataques","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/65Hh6sOJXPxkqgFApZr1MR/86cc93de0d4d1547b58bd0a42117bfff/Auth0-SOSI-Inforgraphic-PTBR.pdf","details":{"size":10501975},"fileName":"Auth0-SOSI-Inforgraphic-PTBR.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Infográfico: Três tipos principais de ataques","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"PT","ocid":"7014z000001cb70AAA-aPA4z000000015EGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:55.047Z","title":"Autenticación después de contraseñas","id":"auth-after-passwords-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1SVoEVcD48VMgFOwHoMfhg","type":"Asset","createdAt":"2022-05-26T19:15:05.025Z","updatedAt":"2022-05-26T19:15:05.025Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticación después de contraseñas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1SVoEVcD48VMgFOwHoMfhg/13bca0bb3389d87b6d2e8a08fa6283d3/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v3_-_SP_Cover_625x892.png","details":{"size":209894,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v3 - SP Cover_625x892.png","contentType":"image/png"}}},"description":"Desde mejorar la experiencia del cliente a través de un inicio de sesión único hasta brindar autenticación multifactor (MFA) de manera simple, el inicio de sesión debe poseer el balance adecuado entre comodidad para el usuario, privacidad y seguridad.\n\nDe hecho, creemos que las empresas que triunfarán en los próximos cinco años serán las más preparadas para satisfacer las crecientes expectativas de los consumidores con respecto a estos tres atributos. \n\n¿Pero cómo será ese futuro y cómo pueden las empresas de hoy convertirse en los líderes de mañana?\n\nEn este libro electrónico, responderemos a estas preguntas y analizaremos el futuro de la autenticación y las repercusiones de la modalidad sin contraseña.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6VjQSkfihUkLmp5hwSn75R","type":"Asset","createdAt":"2022-05-26T19:15:47.625Z","updatedAt":"2022-05-26T19:15:47.625Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticación después de contraseñas","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6VjQSkfihUkLmp5hwSn75R/0c4f3ea04aa4580f70ca02d5130fb9cc/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v3_-_SP_SM.png","details":{"size":1227280,"image":{"width":10417,"height":5067}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v3 - SP SM.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13CpRK4Az06LQhIuhXgeIJ","type":"Asset","createdAt":"2022-05-26T19:16:06.969Z","updatedAt":"2022-05-26T19:16:06.969Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Autenticación después de contraseñas","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/13CpRK4Az06LQhIuhXgeIJ/5760d2b4a13e3ef37006984ac3bf6260/Authentication-After-Passwords-ES.pdf","details":{"size":564381},"fileName":"Authentication-After-Passwords-ES.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- Introducción\n- El futuro de la identidad\n- El imperativo sin fricciones\n- Los flujos de identidad son elementos fundamentales en el recorrido del cliente\n- Primero, lo primero: Autenticación sin contraseña\n- La hoja de ruta sin inicio de sesión\n- Resumen\n- Lo que puede hacer ahora\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"ES","ocid":"7014z000001cb76AAA-aPA4z000000015KGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:54.737Z","title":"パスワードの次の認証","id":"auth-after-passwords-jp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZW2HBXqpm0pOM7YvgtW8o","type":"Asset","createdAt":"2022-05-26T18:48:40.900Z","updatedAt":"2022-05-26T18:48:40.900Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"パスワードの次の認証","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZW2HBXqpm0pOM7YvgtW8o/980996c29840e8439095d5cceb5f0355/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v1_-_JP_Cover_625x892.png","details":{"size":105978,"image":{"width":600,"height":856}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v1 - JP Cover_625x892.png","contentType":"image/png"}}},"description":"シームレスなシングルサインオン(SSO)による顧客体験の改善から、多要素認証(MFA)のスピードアップと簡素化まで、ログインボックスには、ユーザーの利便性、セキュリティ、プライバシーの最適なバランスが求められます。\n\n実際、今後5年間に成功を収める企業とは、これら3つの要素に対して増え続ける顧客の期待に応えることができる企業であると我々は考えます。しかし、将来はどのような形になり、今日の企業が明日のリーダーとなるためにはどのような道のりを歩めばよいのでしょうか。\n\nこのebookでは、こうした質問に答え、認証の未来とパスワードレスの影響を詳しく見ていきます。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"lBVzk2dSCJi73JJzEbuoZ","type":"Asset","createdAt":"2022-05-26T18:49:28.991Z","updatedAt":"2022-05-26T18:49:28.991Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"パスワードの次の認証","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/lBVzk2dSCJi73JJzEbuoZ/437f833c2348686310f79f95b6a18f62/88985_Ebook_-_Passwordless_Assets_Auth0_Superside_v2_-_JP_SM.png","details":{"size":1182752,"image":{"width":10417,"height":5067}},"fileName":"88985_Ebook - Passwordless Assets_Auth0_Superside_v2 - JP SM.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"NhGkdDDi7013ZgUrsMTDU","type":"Asset","createdAt":"2022-05-26T18:53:34.728Z","updatedAt":"2022-05-26T18:53:34.728Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"パスワードの次の認証","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/NhGkdDDi7013ZgUrsMTDU/631ef668b81e5a0d462a14baae782271/Authentication-After-Passwords-JP.pdf","details":{"size":2122638},"fileName":"Authentication-After-Passwords-JP.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"- はじめに\n- ID の未来\n- フリクションレスの重要性\n- ID フローはカスタマージャーニーの基本的要素である\n- 最初に最優先課題に取り組む:パスワードレス認証\n- ログインレスロードマップ\n- まとめ\n- 今、できること","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001cb74AAA-aPA4z000000015IGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:53.638Z","title":"Manual de JWT","id":"jwt-handbook-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"WEjyg0PWgsKLxrYrWPH0E","type":"Asset","createdAt":"2022-03-18T18:13:50.300Z","updatedAt":"2022-04-26T18:52:52.619Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Manual de JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/WEjyg0PWgsKLxrYrWPH0E/37ba57cc2cfdaa1d2f103ca2d5b3dc6b/JWT_Handbook_625x892px_Spanish.jpg","details":{"size":113408,"image":{"width":600,"height":856}},"fileName":"JWT Handbook_625x892px_Spanish.jpg","contentType":"image/jpeg"}}},"description":"¿Se ha preguntado alguna vez cómo surgió JWT y qué problemas trataba de resolver? ¿Siente curiosidad por descubrir la enorme cantidad de algoritmos que hay disponibles para firmar y cifrar los JWT? ¿O prefiere ponerse al día con los JWT lo antes posible? Entonces este manual es para usted. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"s27CuFRxHry5L4eVIGD5t","type":"Asset","createdAt":"2022-03-18T18:14:12.439Z","updatedAt":"2022-03-18T18:14:12.439Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Manual de JWT","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/s27CuFRxHry5L4eVIGD5t/cc630f64a641c0c0d1749df431c4f1f1/Ebook__Digital_Trans__template_1250x608px.png","details":{"size":173937,"image":{"width":1250,"height":608}},"fileName":"Ebook_(Digital_Trans)_template_1250x608px.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"20qmpOMjITMY8YCBxGmnsd","type":"Asset","createdAt":"2022-03-18T18:14:41.581Z","updatedAt":"2022-04-26T18:54:46.657Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Manual de JWT","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/20qmpOMjITMY8YCBxGmnsd/6fb160434c5ab2ca1a3dc7119e06d18b/Auth0_JWT_Handbook_ES-updated.pdf","details":{"size":4804689},"fileName":"Auth0_JWT Handbook_ES-updated.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Agradecimientos\n\nCapítulo 1\nIntroducción\n1.1 ¿Qué es un JSON Web Token?\n1.2 ¿Qué problema soluciona?\n1.3 Un poco de historia\n\nCapítulo 2\nAplicaciones prácticas\n2.1 Sesiones del lado en cliente/sin estado\n2.1.1 Consideraciones de seguridad\n2.1.1.1 Eliminación de firmas\n2.1.1.2 Falsificación de solicitud entre sitios (CSRF)\n2.1.1.3 Scripting de sitio cruzado (XSS)\n2.1.2 ¿Son útiles las sesiones del lado del cliente?\n2.1.3 Ejemplo\n2.2 Identidad federada\n2.2.1 Tokens de acceso y actualización\n2.2.2 JWTs y OAuth2\n2.2.3 JWTs y OpenID Connect\n2.2.3.1 Flujos OpenID Connect y JWTs\n2.2.4 Ejemplo\n\nCapítulo 3\nDatos sobre los tokens web de JSON\n3.1 El encabezado\n3.2 La carga útil\n3.2.1 Notificaciones registrados\n3.2.2  Notificaciones públicas y privadas\n3.3 JWTs no seguros\n3.4 Creación de un JWT no seguro\n3.4.1 Código de ejemplo\n3.5 Análisis de un JWT no seguro\n3.5.1 Código de ejemplo\n\nCapítulo 4\n4.1 Estructura de un JWT firmado\n4.1.1 Descripción general del algoritmo para serialización compacta\n4.1.2 Aspectos prácticos de algoritmos de firma\n4.1.3 Notificaciones de encabezado JWS\n4.1.4 Serialización JWS JSON\n4.1.4.1 Serialización JSON JWS plana\n4.2 Tokens de firma y validación\n4.2.1 HS256: HMAC + SHA-256\n4.2.2 RS256: RSASSA + SHA256\n4.2.3 ES256: ECDSA con P-256 y SHA-256\n\nCapítulo 5\n5.1 Estructura de un JWT cifrado\n5.1.1 Algoritmos de cifrado clave\n5.1.1.1 Modos de gestión de claves\n5.1.1.2 Clave de cifrado de contenidos (CEK) y Clave de cifrado JWE\n5.1.2 Algoritmos de cifrado de contenido\n5.1.3 El encabezado\n5.1.4 Descripción general del algoritmo para serialización compacta\n5.1.5.1 Serialización JSON do JWE plana\n5.2 Criptografia e descriptografia de tokens\n5.2.1 Introducción: Gestión de claves con node-jose\n5.2.2 AES-128 Key Wrap (Clave) + AES-128 GCM (Contenido)\n5.2.3 RSAES-OAEP (Clave) + AES-128 CBC + SHA-256 (Contenido)\n5.2.4 ECDH-ES P-256 (Clave) + AES-128 GCM (Contenido)\n5.2.5 JWT anidado: ECDSA usando P-256 y SHA-256 (Firma) + RSAES-OAEP (Clave cifrada) + AES-128 CBC + SHA-256 (Contenido cifrado)\n5.2.6 Descifrado\n\nCapítulo 6\nClaves web de JSON (JWK)\n6.1 Estructura de una clave web de JSON.\n6.1.1 Conjunto claves web de JSON\n\nCapítulo 7\nAlgoritmos web de JSON\n7.1 Algoritmos generales\n7.1.1 Base64\n7.1.1.1 Base64-URL\n7.1.1.2 Código de ejemplo\n7.1.2 SHA\n7.2 Algoritmos de firma\n7.2.1 HMAC\n7.2.1.1 HMAC + SHA256 (HS256)\n7.2.2 RSA\n7.2.2.1 Elección de e, d y n\n7.2.2.2 Firma básica\n7.2.2.3 RS256:  RSASSA PKCS1 v1.5 con SHA-256\n7.2.2.3.1 Algoritmo\n7.2.2.3.1.1 EMSA-PKCS1-v1_5 primitivo\n7.2.2.3.1.2 OS2IP primitivo\n7.2.2.3.1.3 Primitivo RSASP1\n7.2.2.3.1.4 Primitivo RSAVP1\n7.2.2.3.1.5 Primitivo I2OSP\n7.2.2.3.2 Código de ejemplo\n7.2.2.4 PS256: RSASSA-PSS con SHA-256 e MGF1 con SHA-256\n7.2.2.4.1 Algoritmo\n7.2.2.4.1.1 MGF1: la función de generación de máscaras\n7.2.2.4.1.2 Primitivo EMSA-PSS-ENCODE\n7.2.2.4.1.3 Primitivo EMSA-PSS-VERIFY\n7.2.2.4.2 Código de exemplo\n7.2.3 Curva elíptica\n7.2.3.1  Aritmética curva elíptica\n7.2.3.1.1 Suma de puntos\n7.2.3.1.2 Duplicado de puntos\n7.2.3.1.3 Multiplicación escalar\n7.2.3.2 Algoritmo de Firma Digital de Curva Elíptica (ECDSA\n7.2.3.2.1 Parámetros del dominio de la curva elíptica\n7.2.3.2.2 Claves públicas y privadas\n7.2.3.2.2.1 El problema del logaritmo discreto\n7.2.3.2.3 ES256:  ECDSA con P-256 y SHA-256\n7.3 Futuras actualizaciones\n\nCapítulo 8\nAnexo A. Mejores prácticas actuales\n8.1 Obstáculos y ataques frecuentes\n8.1.1 Ataque “alg:  none”\n8.1.2 Clave pública RS256 como ataque secreto HS256\n8.1.3 Claves HMAC débiles\n8.1.4 Cifrado apìlado incorrecto + Supuestos de comprobación de la firma\n8.1.5 Ataques a la curva elíptica no válida\n8.1.6 Ataques de sustitución\n8.1.6.1 Destinatario diferente\n8.1.6.2 Mismo destinatario/cruce de JWT\n8.2 Mitigaciones y mejores prácticas\n8.2.1 Realizar siempre la verificación del algoritmo\n8.2.2 Utilizar algoritmos adecuados\n8.2.3  Realizar siempre todas las validaciones\n8.2.4  Validar siempre las entradas criptográficas\n8.2.5  Escoger claves seguras\n8.2.6 Validar todas las notificaciones posibles\n8.2.7 Utilizar la notificación typ para separar los tipos de tokens\n8.2.8 Utilizar diversas reglas de validación para cada token\n8.3 Conclusión","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"ES","ocid":"7014z000001cb0XAAQ-aPA4z000000010pGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:52.016Z","title":"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3","id":"top-3-attacks-that-threaten-identity-security-jp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4Yt8O5qllKw627nUAnlENt","type":"Asset","createdAt":"2022-03-29T17:45:32.109Z","updatedAt":"2022-03-29T23:15:05.930Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"\"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3\"","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4Yt8O5qllKw627nUAnlENt/d3d2f76d6cc6b040405bfa6dd46b4232/-Landing_Page-_3_Attacks_-_JP_pink_625x892px.jpg","details":{"size":103901,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3 Attacks - JP pink 625x892px.jpg","contentType":"image/jpeg"}}},"description":"Auth0の最初の [「 State of Secure Identityレポート」](https://auth0.com/resources/whitepapers/jp-state-of-security-identity-report) の一部として発表された このインフォグラフィックでは、IDセキュリティを脅かす攻撃のトップ3が明らかにされています。\n\n2021年6月に発表されたAuth0 State of Secure Identity Reportでは、IDセキュリティ空間の定義、新たな脅威の解明、および緩和のための具体的戦略の提供に役立つ、独自の傾向と分析から得た洞察を明らかにしています。\n\nより詳細な分析については、完全版の [「 State of Secure Identityレポート」](https://auth0.com/resources/whitepapers/jp-state-of-security-identity-report) をお読みいただき、 以下についてご確認ください。\n\n- クレデンシャルスタッフィング\n- インジェクション攻撃\n- 偽アカウントの作成\n- MFAバイパス攻撃\n- これらの攻撃に対して、どのような防御策をとっているか","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"QZbIQKIrcTCUEVZnWvq6f","type":"Asset","createdAt":"2022-03-29T17:46:09.427Z","updatedAt":"2022-03-29T17:46:09.427Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"\"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3\"","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/QZbIQKIrcTCUEVZnWvq6f/430747e2f5f784e525e3fcf92dcd7a93/-Share_Asset-_3_Attacks_-_JP_pink-1250x608px.jpg","details":{"size":2096227,"image":{"width":5208,"height":2533}},"fileName":"-Share Asset- 3 Attacks - JP pink-1250x608px.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2bRzZyuGMxs1sIf0YScYl6","type":"Asset","createdAt":"2022-03-29T17:46:53.173Z","updatedAt":"2022-03-29T17:46:53.173Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"\"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3\"","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/2bRzZyuGMxs1sIf0YScYl6/ee871a5b3c0dfb3e02bf84b045abde14/3-Attacks-Infographic_jp.pdf","details":{"size":12403755},"fileName":"3-Attacks-Infographic_jp.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"インフォグラフィック: IDセキュリティを脅かす攻撃トップ3","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001cb86AAA-aPA4z000000015uGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:49.327Z","title":"OAuth2 y OpenID Connect: La Guía Profesional","id":"open-id-connect-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4BMb9U2YXolciRPA92FApl","type":"Asset","createdAt":"2022-03-18T19:49:59.411Z","updatedAt":"2022-03-18T19:49:59.411Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 y OpenID Connect: La Guía Profesional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4BMb9U2YXolciRPA92FApl/c2d4b6da33b2cee961ffb89f6045393a/OAuth2_and_OpenID_Connect_625x892px_Spanish.jpg","details":{"size":145477,"image":{"width":600,"height":856}},"fileName":"OAuth2 and OpenID Connect_625x892px_Spanish.jpg","contentType":"image/jpeg"}}},"description":"La autenticación y la autorización son aspectos fundamentales de cualquier aplicación. Han evolucionado a lo largo de los años para cumplir los requisitos más exigentes de la web moderna. OAuth2 y OpenID Connect ofrecen un marco para manejarlas de manera eficaz. Conozca las mejores prácticas en el uso de ambos estándares en escenarios y tipos de aplicaciones distintos. Este libro electrónico le explicará no solo el cómo, sino también el porqué de OAuth2 y OpenID Connect.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2VO8lfgxzWAyXqTCRp3fvW","type":"Asset","createdAt":"2022-03-18T19:51:57.264Z","updatedAt":"2022-03-18T19:51:57.264Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 y OpenID Connect: La Guía Profesional","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2VO8lfgxzWAyXqTCRp3fvW/f18b1494fd7710aa8e68a8ba987e7ed6/Ebook__Digital_Trans__template_1250x608px__1_.png","details":{"size":195928,"image":{"width":1250,"height":608}},"fileName":"Ebook_(Digital_Trans)_template_1250x608px (1).png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"PrzPoyTpG27D4PdSPKpu9","type":"Asset","createdAt":"2022-03-18T19:53:25.009Z","updatedAt":"2022-03-18T19:53:25.009Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OAuth2 y OpenID Connect: La Guía Profesional","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/PrzPoyTpG27D4PdSPKpu9/ee11924b1275c0061037ffb47b80bb03/Auth0_OAuth2_and_OpenID_Connect_Professional_Guide_ES.pdf","details":{"size":4526479},"fileName":"Auth0_OAuth2_and_OpenID_Connect_Professional_Guide_ES.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"La autenticación y la autorización son aspectos fundamentales de cualquier aplicación. Han evolucionado a lo largo de los años para cumplir los requisitos más exigentes de la web moderna. OAuth2 y OpenID Connect ofrecen un marco para manejarlas de manera eficaz. Conozca las mejores prácticas en el uso de ambos estándares en escenarios y tipos de aplicaciones distintos. Este libro electrónico le explicará no solo el cómo, sino también el porqué de OAuth2 y OpenID Connect.","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"ES","ocid":"7014z000001cb1NAAQ-aPA4z000000011MGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:48.114Z","title":"Infographie: Les 3 principales attaques menaçant la sécurité","id":"state-of-secure-identity-infographic-fr","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5ycSKktkrDEla6ofpMhkTa","type":"Asset","createdAt":"2022-03-14T19:59:31.336Z","updatedAt":"2022-03-14T19:59:31.336Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Infographie: Les 3 principales attaques menaçant la sécurité des identités","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5ycSKktkrDEla6ofpMhkTa/8683a5271b378b0976f5d95a07249b00/-Landing_Page-_3Attacks_-_FR__625x892px_.jpeg","details":{"size":180172,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - FR (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Publiée dans le Rapport inaugural d'Auth0 sur [l'État de l’identité sécurisée](https://auth0.com/resources/whitepapers/state-of-security-identity-report-fr), cette infographie révèle les trois principales attaques qui menacent la sécurité des identités.\n\nPublié en juin 2021, le Rapport sur l'État de l’identité sécurisée d’Auth0 révèle des éclairages exploitables basés sur nos propres analyses et tendances, pour aider à définir l'espace de la sécurité des identités, clarifier les menaces émergentes et fournir des stratégies concrètes pour les atténuer.\n\nPour une analyse plus approfondie, consultez le rapport complet sur [l'État de l’identité sécurisée](https://auth0.com/resources/whitepapers/state-of-security-identity-report-fr) et pour en savoir plus sur les sujets suivants:\n- Bourrage d’identifiants\n- Attaques par injection\n- Création de faux comptes\n- Attaques par contournement de l’AMF\n- Les mesures défensives adoptées pour contrer ces attaques","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6YkVv60uSzp7wGO9kPaP7t","type":"Asset","createdAt":"2022-03-14T20:01:37.092Z","updatedAt":"2022-03-14T20:01:37.092Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Infographie: Les 3 principales attaques menaçant la sécurité","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6YkVv60uSzp7wGO9kPaP7t/e267213d089a8c17d3ff158b020dec42/-Share_Asset-_3Attacks_-_FR__Horizontal_.jpeg","details":{"size":103655,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- 3Attacks - FR (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2qlMzHMeE8mD7EiwkrIuDg","type":"Asset","createdAt":"2022-03-14T20:02:10.324Z","updatedAt":"2022-03-14T20:02:10.324Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infographie: Les 3 principales attaques menaçant la sécurité","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/2qlMzHMeE8mD7EiwkrIuDg/186c8749f9b3a0fb4a6a3cd58fb434de/Identity_Security_Report_Infographic_FR.pdf","details":{"size":45687786},"fileName":"Identity_Security_Report_Infographic_FR.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Publié en juin 2021, le Rapport sur l'État de l’identité sécurisée d’Auth0 révèle des éclairages exploitables basés sur nos propres analyses et tendances, pour aider à définir l'espace de la sécurité des identités, clarifier les menaces émergentes et fournir des stratégies concrètes pour les atténuer.","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001cbBbAAI-aPA4z000000015sGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:47.417Z","title":"Infografik: Die drei häufigsten Angriffsgefahren","id":"state-of-secure-identity-infographic-de","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3E31FFcXHVB5UWe0vwI8RX","type":"Asset","createdAt":"2022-03-14T18:43:30.536Z","updatedAt":"2022-03-18T18:39:28.562Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"locale":"en-US"},"fields":{"title":"Infografik: Die drei häufigsten Angriffsgefahren","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3E31FFcXHVB5UWe0vwI8RX/75401a9d169c8808aa8561cfafdd87e7/-Landing_Page-_3Attacks_-_DE__625x892px_.jpg","details":{"size":193802,"image":{"width":600,"height":856}},"fileName":"-Landing_Page-_3Attacks_-_DE__625x892px_.jpg","contentType":"image/jpeg"}}},"description":"Diese Infografik, herausgegeben als Teil von Auth0s erstem [Bericht zur Lage der sicheren Identität](https://auth0.com/resources/whitepapers/state-of-security-identity-report-de), zeigt, welche drei Angriffe die Identitätssicherheit am meisten gefährden.\n\nDer Bericht wurde im Juni 2021 veröffentlicht und bietet Einblick in die von Auth0 ermittelten Trends und Analysen zur Lage der sicheren Identität, anhand derer der Bereich der Identitätssicherheit definiert, aufkommende Bedrohungen identifiziert und konkrete Strategien zur Schadensminderung erstellt werden können.\n\nFür eine tiefgreifende Analyse lesen Sie den [Bericht zur Lage der sicheren Identität](https://auth0.com/resources/whitepapers/state-of-security-identity-report-de) in voller Länge und erfahren Sie alles über:\n- Credential Stuffing\n- Code-Injektions-Angriffe\n- Betrügerische Registrierungen (Fake-Konten)\n- Umgehung von MFA\n- Schutzmaßnahmen zur Abwehr dieser Angriffe","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"k1HGIeuLmIKBBMLNkFMFF","type":"Asset","createdAt":"2022-03-14T18:45:04.896Z","updatedAt":"2022-03-14T18:45:04.896Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Infografik: Die drei häufigsten Angriffsgefahren","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/k1HGIeuLmIKBBMLNkFMFF/7be239ce331108390350234cf8a02541/-Share_Asset-_3Attacks_-_DE__Horizontal_.jpeg","details":{"size":99538,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- 3Attacks - DE (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"D8mJ8DyxbTzM1oEfTbY0o","type":"Asset","createdAt":"2022-03-14T18:47:03.852Z","updatedAt":"2022-03-14T18:47:03.852Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infografik: Die drei häufigsten Angriffsgefahren","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/D8mJ8DyxbTzM1oEfTbY0o/07361a5a0f354d5b0073e384747c7034/Identity_Security_Report_Infographic_DE.pdf","details":{"size":45688955},"fileName":"Identity_Security_Report_Infographic_DE.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Der Bericht wurde im Juni 2021 veröffentlicht und bietet Einblick in die von Auth0 ermittelten Trends und Analysen zur Lage der sicheren Identität, anhand derer der Bereich der Identitätssicherheit definiert, aufkommende Bedrohungen identifiziert und konkrete Strategien zur Schadensminderung erstellt werden können.","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbB7AAI-aPA4z000000015tGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:45.542Z","title":"Infografía: Los 3 principales ataques a la seguridad de la identidad","id":"state-of-secure-identity-infographic-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6v44fvM0CF1ifrYCjWo1Kd","type":"Asset","createdAt":"2021-12-02T19:33:31.015Z","updatedAt":"2022-03-12T00:42:25.034Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":3,"locale":"en-US"},"fields":{"title":"Infografía: Los 3 principales ataques ala seguridad de la identidad","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6v44fvM0CF1ifrYCjWo1Kd/515f33a1b2f264b7ac08632ec0940cb0/-Landing_Page-_3Attacks_-_ES__625x892px_.jpeg","details":{"size":184722,"image":{"width":600,"height":856}},"fileName":"-Landing Page- 3Attacks - ES (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Publicada como parte del informe inaugural de Auth0 [Estado de la identidad segura](https://auth0.com/resources/whitepapers/state-of-secure-identity-report-es), esta infografía revela los 3 ataques más importantes que amenazan la seguridad de las identidades.\n\nPublicado en junio de 2021, el Informe Estado de la identidad segura de Auth0 revela las ideas de nuestras propias tendencias y análisis para ayudar a definir el espacio de la seguridad de identidades, aclarar las amenazas emergentes y proporcionar estrategias concretas para su contención.\n\nSi desea un análisis más profundo, lea [el informe Estado de la identidad segura completo](https://auth0.com/resources/whitepapers/state-of-secure-identity-report-es) para estar informado sobre:\n- Reutilización de credenciales\n- Ataques de inyección\n- Creación de cuentas falsas\n- Ataques de omisión MFA\n- Qué medidas defensivas se han adoptado para combatir estos ataques","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ji9zYBsTpCKti6xwyuv0z","type":"Asset","createdAt":"2021-12-02T19:36:57.890Z","updatedAt":"2022-03-12T00:44:34.596Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Infografía: Los 3 principales ataques ala seguridad de la identidad","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ji9zYBsTpCKti6xwyuv0z/6bfe7a734f52c59026b5286dc902e69b/-Share_Asset-_3Attacks_-_ES__Horizontal_.jpeg","details":{"size":110252,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- 3Attacks - ES (Horizontal).jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3DrFyJRRhLWeovMRQ1wES5","type":"Asset","createdAt":"2021-12-02T19:37:51.739Z","updatedAt":"2021-12-02T19:37:51.739Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Infografía: Los 3 principales ataques ala seguridad de la identidad","description":"","file":{"url":"//downloads.ctfassets.net/2ntc334xpx65/3DrFyJRRhLWeovMRQ1wES5/e0e4573d303c55fde3be6b1c642808a2/65359_Identity_Security_Report_Mobile-friendly_Infographic_Auth0_ES.pdf","details":{"size":10503299},"fileName":"65359_Identity Security Report Mobile-friendly Infographic_Auth0_ES.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Infografía: Los 3 principales ataques ala seguridad de la identidad","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"ES","ocid":"7014z000001cb71AAA-aPA4z000000015FGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:44.383Z","title":"Passwortlose Authentifizierung","id":"passwortlose-authentifizierung","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6H5Lbks8P4KJ3qH1JKuijP","type":"Asset","createdAt":"2022-02-18T09:27:32.863Z","updatedAt":"2022-02-18T09:51:45.113Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Passwortlose Authentifizierung - Thumbnail","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6H5Lbks8P4KJ3qH1JKuijP/7685fd942193c6d6378f722e590ef74e/Passwortlose_Authentifizierung_-_Cover.png","details":{"size":131949,"image":{"width":600,"height":856}},"fileName":"Passwortlose Authentifizierung - Cover.png","contentType":"image/png"}}},"description":"Von der Verbesserung des Kundenerlebnisses durch nahtloses Single Sign-On (SSO) bis hin zur schnellen und einfachen Multi-Faktor-Authentifizierung (MFA) - Ihre Login-Box muss die richtige Balance zwischen Benutzerfreundlichkeit, Sicherheit und Datenschutz finden.\n\nWir glauben, dass die Unternehmen, die in den nächsten fünf Jahren erfolgreich sein werden, am besten in der Lage sein werden, die ständig wachsenden Erwartungen der Verbraucher in Bezug auf diese drei Eigenschaften zu erfüllen. Doch wie wird diese Zukunft aussehen, und auf welchem Weg können die Unternehmen von heute die Marktführer von morgen werden?\n\nIn diesem eBook werden wir diese Fragen beantworten und einen genaueren Blick auf die Zukunft der Authentifizierung und die Auswirkungen des passwortlosen Verfahrens werfen.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2xyRpv6X4kWlOwDfgpFYcn","type":"Asset","createdAt":"2022-02-18T09:40:00.898Z","updatedAt":"2022-02-18T09:40:00.898Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Passwortlose Authentifizierung - Share Asset","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2xyRpv6X4kWlOwDfgpFYcn/c19965b4bd6a04725bdcc65efb10a81d/Passwortlose_Authentifizierung_-_Share_Asset.png","details":{"size":601660,"image":{"width":1556,"height":756}},"fileName":"Passwortlose Authentifizierung - Share Asset.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5rGCzvUBXqMIfJeEebEuGj","type":"Asset","createdAt":"2022-02-18T09:28:33.367Z","updatedAt":"2022-02-18T09:28:33.367Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Passwortlose Authentifizierung","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5rGCzvUBXqMIfJeEebEuGj/bba8e6e6c06ac6cfac34d994ab61534d/Passwortlose_Authentifizierung.pdf","details":{"size":694845},"fileName":"Passwortlose Authentifizierung.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"__Einleitung__\n\n- Trugschluss 1: Es ist unmöglich, Komfort, Sicherheit und Datenschutz gleichzeitig zu bieten\n\n__Die Zukunft von Identity__\n\n- Die Welt bewegt sich auf eine Zukunft ohne Login zu\n- Vertrauen bildet die Grundlage\n- Trugschluss 2: Loginless ist nicht sicher\n\n__Reibungslosigkeit als Imperativ__\n\n- Reibungsverluste sind der natürliche Feind des Umsatzes (das ist der Tweet)\n- Die Reduzierung von Reibungsverlusten bietet einen Wettbewerbsvorteil\n- Reibungsverluste beeinträchtigen die Accessibility\n\n__Identity Flows sind grundlegende Elemente der Customer Journey__\n\n- Trugschluss 3: Reibungsverluste sind ein technisches, kein betriebswirtschaftliches Problem\n\n__Das Wichtigste zuerst: Passwortlose Authentifizierung__\n\n- Trugschluss 4: Sie haben noch keinen Passwordless Flow\n- Die passwortlose Authentifizierung kann Reibungsverluste minimieren und gleichzeitig die Sicherheit erhöhen\n\n__Die Loginless Roadmap__\n\n- Trugschluss 5: Wir können aktuell keine nennenswerten Fortschritte machen (also warten wir ab)\n- Ändern Sie Ihre Einstellung in Bezug auf Identity Flows und Authentifizierung\n- Begnügen Sie sich nicht mit Passwörtern\n- Schaffen Sie Vertrauen\n- Trugschluss 6: Personenbezogene Daten sind mehr wert als Vertrauen\n- Fangen Sie an zu vertrauen\n- Trugschluss 7: Passwörter sind sicher; andere Authentifizierungsmethoden sind es nicht\n- Nutzen und fördern Sie biometrische Authentifizierung\n- Trugschluss 8: Biometrische Authentifizierung ist datenschutzrechtlich bedenklich\n- Priorisieren Sie Accessibility 27\n- Nutzen Sie Progressive Enrollment\n- Trugschluss 9: Sobald man eine bestimmte Authentifizierungsmethode anbietet, ist die Arbeit getan\n\n__Fazit__\n\n- Trugschluss 10: Es ist zu schwierig, auf Passwordlessumzustellen\n- Was Sie jetzt tun können\n- Erfahren Sie mehr über Identity Management mit Auth0 \n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbBYAAY-aPA4z000000015bGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:44.059Z","title":"Customer Identity \u0026 Access Management For Dummies (CIAM)","id":"ciam-for-dummies-de","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"16WamAUy5bya4mnM9nQXPq","type":"Asset","createdAt":"2022-02-03T14:52:40.578Z","updatedAt":"2022-02-03T15:46:48.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"CIAM for Dummies DE Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/16WamAUy5bya4mnM9nQXPq/fcebd8310aa11edc65ab0a3b81767622/CIAM_for_Dummies_DE_Cover.png","details":{"size":180019,"image":{"width":600,"height":856}},"fileName":"CIAM for Dummies DE Cover.png","contentType":"image/png"}}},"description":"Benutzernamen und Passwörter sind zu einem Teil des täglichen Lebens geworden. Die Verbraucher verwalten verschiedene Konten für Online-Einkäufe, Bankkonten und mobile Apps. Dies ist Kundenidentitäts- und -zugangsmanagement (CIAM), und Sie erkennen zweifellos einige der Unterschiede zwischen gutem und schlechtem CIAM in vielen Ihrer digitalen Erfahrungen. So kann Ihnen beispielsweise Ihre mobile Banking-App ein starkes Gefühl der Sicherheit und Benutzerfreundlichkeit vermitteln, indem sie Sie einfach mit einem Fingerabdruck oder Gesichtsscan authentifiziert. Andererseits haben Sie wahrscheinlich schon mehr als einmal einen Online-Einkaufswagen verlassen, wenn ein Händler von Ihnen eine langwierige Registrierung verlangt. Die Registrierung kann mehr Zeit in Anspruch nehmen als die Suche nach den Produkten, die Sie gesucht haben!\n\nLaden Sie dieses eBook herunter und erfahren Sie mehr darüber:\n\n- Was CIAM ist und warum es wichtig ist\n- Welche Fähigkeiten und Funktionen eine moderne CIAM-Lösung bieten sollte\n- Zehn Schritte zur Implementierung der richtigen CIAM-Lösung für Ihr Unternehmen\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7J070SsYT1Hgn1xBumsFBG","type":"Asset","createdAt":"2022-02-03T15:24:51.261Z","updatedAt":"2022-02-03T15:24:51.261Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM for Dummies DE - Share Asset","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7J070SsYT1Hgn1xBumsFBG/480162a9fce5aee7fe1ed41d70c67275/CIAM_for_Dummies_DE_-_Share_Asset.png","details":{"size":199411,"image":{"width":1265,"height":611}},"fileName":"CIAM for Dummies DE - Share Asset.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2QepgEYNHPCisGFpTYwjDP","type":"Asset","createdAt":"2022-02-03T14:55:09.635Z","updatedAt":"2022-02-03T14:55:09.635Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Customer Identity \u0026 Access Management (CIAM) For Dummies, German Auth 0","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/2QepgEYNHPCisGFpTYwjDP/d6376b9183c9725fab6c546a3e4000c3/Customer_Identity___Access_Management__CIAM__For_Dummies_DE.pdf","details":{"size":3404421},"fileName":"Customer Identity \u0026 Access Management (CIAM) For Dummies DE.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"### EINLEITUNG\t\t\t\n- Über das Buch\n- Naive Annahmen\n- In diesem Buch verwendete Icons\n- Über das Buch hinaus\n\n### Was ist CIAM?\t\t\t\t\t\n- Was ist CIAM?\n- Was ist schlechtes CIAM?\n- Kunde, Geschäftsmodell und Anwendungstypen\n- Schlüsselfunktionen\n\n### Warum CIAM wichtig ist (jetzt mehr denn je)\n- Die Nachfrage nach moderner Customer Experience befriedigen\n- Kundenvertrauen aufbauen\n- Digitale Transformation\n\n### Ein CIAM aufzubauen, ist schwierig\t\t\t\t\n- Ein heikler Balanceakt: Customer Experience versus Security und Compliance\n- Qualifizierte Entwickler gewinnen und binden\n- Zusätzliche Überlegungen\n- Eine klassische Build-versus-Buy-Entscheidung\n\n### Wie eine moderne CIAM-Lösung Ihnen helfen kann\t\t\t\t\t\n- Was versteht man unter einer modernen CIAM-Lösung?\n- Reibungslose User Experience \n- Time-to-Market\n- Zentralisiertes Management\n- Robuste Security\n- Plattformansatz\n- Sichere, zuverlässige und skalierbare Infrastruktur\n- Use Cases\t\t\t\t\t\n- Schutz vor Kontoübernahmen\n- Entwicklung hoch skalierbarer Anwendungen\n- Anwendungsübergreifende Vereinheitlichung von Customer Identities \n- Integration von Enterprise Identities\n- Schutz des API-Zugriffs\n\n### Worauf es bei einer modernen CIAM-Lösung ankommt\n- Produkt\n- Plattform\n- Infrastruktur\n- Branchenführerschaft\n\n### Wie Ihr CIAM sein Potenzial entfaltet und Ihren Business-Anforderungen gerecht wird\n- Der Weg zur CIAM-Reife\n- Grundstufe: Build versus Buy\n- Automatisiert: Zentralisieren und Skalieren\n- Intelligent: Optimieren ohne Kompromisse\n- Durchgängig: Vorangehen und neue Maßstäbe setzen\n\n### Die Zukunft von CIAM\n- Kundenbindung erhöhen\n- Bessere Security Outcomes erzielen\n- Datenschutz sicherstellen\n- Komplexität manage\n\n### Zehn Überlegungen zu CIAM\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbBaAAI-aPA4z000000015mGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:43.725Z","title":"Studie (C)IAM 2022 - Die wichtigsten Ergebnisse","id":"studie-ciam-2022-die-wichtigsten-ergebnisse","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"73UkZchKJ7j6x67SFtVTpG","type":"Asset","createdAt":"2022-01-14T11:13:52.744Z","updatedAt":"2022-01-14T11:22:49.895Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"IDG CIAM 2022 - Die wichtigsten Ergebnisse Cover","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/73UkZchKJ7j6x67SFtVTpG/45538bfa8bf5abec07fafe6d5777bc3f/idg-ciam-studie-cover-de.png","details":{"size":225065,"image":{"width":600,"height":856}},"fileName":"idg-ciam-studie-cover-de.png","contentType":"image/png"}}},"description":"Mit einer CIAM-Strategie lassen sich IT-Sicherheit und Customer Experience verbinden. Die Trendstudie von Auth0 in Zusammenarbeit mit IDG Research Services deckt auf, worauf es bei diesem Zusammenspiel besonders ankommt.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"mAOwUn6g82nnsxeiIgqTZ","type":"Asset","createdAt":"2022-01-14T11:14:53.158Z","updatedAt":"2022-01-14T11:14:53.158Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Share Asset - Studie CIAM 2022 - Die wichtigsten Ergebniss","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/mAOwUn6g82nnsxeiIgqTZ/3ad410db49432690011d96bafbc3f8a7/share-asset-studie-ciam-2022-final.png","details":{"size":320949,"image":{"width":1640,"height":924}},"fileName":"share-asset-studie-ciam-2022-final.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"59nbmQS9q26PZagLUYLZ0Y","type":"Asset","createdAt":"2022-02-01T11:44:30.497Z","updatedAt":"2022-02-01T11:45:18.912Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"IDG Studie CIAM - 2022","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/59nbmQS9q26PZagLUYLZ0Y/d68289e024c3051618d9d4f22d6ab83a/IDG-Studie-2022-CIAM.pdf","details":{"size":6946912},"fileName":"IDG-Studie-2022-CIAM.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"__Die wichtigsten Ergebnisse__\n\nManagement Summary\n\nDie weiteren Key Findings\n- Der Kunde kommt oft zu kurz\n- Angst vor Know-how-Mangel\n- IAM-Bedarf im Endkundengeschäft wächst\n- Vor allem Kundendaten werden mittels IAM-Tools verarbeitet\n- IT-Bereich und Security dominieren die CIAM-Strategie\n- Cloudbasiertes IAM auf der Überholspur\n- Top-Priorität Datensicherheit\n- Jedes zweite Unternehmen glaubt noch an das Passwort\n- Neue Authentifizierungs-Technologien werden zu CIAM-Treibern\n- Injektionsangriffe und Credential Stuffing als relevanteste Cyberattacken\n\n__Blick in die Zukunft__\n\nBesser die Kundenbrille statt nur die IT-Brille bei CIAM-Projekten aufsetzen","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbBXAAY-aPA4z000000015XGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:42.241Z","title":"期待値 VS. 現実:ログイン において","id":"expectations-vs-reality-log-inn-jp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1p04PcgDoLt2eeAV4rvl3G","type":"Asset","createdAt":"2021-12-08T21:39:46.312Z","updatedAt":"2021-12-08T21:39:46.312Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"期待値 VS. 現実:ログイン において","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1p04PcgDoLt2eeAV4rvl3G/7be840cbe9671ad36243859ec9533532/Screen_Shot_2021-12-08_at_1.33.35_PM.png","details":{"size":550208,"image":{"width":600,"height":856}},"fileName":"Screen Shot 2021-12-08 at 1.33.35 PM.png","contentType":"image/png"}}},"description":"このレポートでは、17,000 人以上のグローバル IT リーダーや消費者からの独自見解をもとに、セキュリティに妥協することなくログインを改善し、現代的な ID 管理戦略から新しいビジネスチャンスを引き出す方法を紹介しています。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"koK9cMkeMAVfuhzEmMxDM","type":"Asset","createdAt":"2021-12-08T21:44:01.011Z","updatedAt":"2021-12-08T21:45:07.636Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"en-US"},"fields":{"title":"期待値 VS. 現実:ログイン において","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/koK9cMkeMAVfuhzEmMxDM/2c646e201db8945b716e09a67ab78bd5/loginnshareasset-jp.jpg","details":{"size":92673,"image":{"width":1250,"height":608}},"fileName":"loginnshareasset-jp.jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4p5J8ZLEeu6xXgLxc1IkEe","type":"Asset","createdAt":"2021-12-08T21:46:37.317Z","updatedAt":"2021-12-08T21:46:37.317Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"期待値 VS. 現実:ログイン において","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/4p5J8ZLEeu6xXgLxc1IkEe/ee5bd53574a72f63a1d9e3c65e485132/Auth0_Reality_Expectation_Report_JP.pdf","details":{"size":4482552},"fileName":"Auth0_Reality_Expectation_Report_JP.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"顧客が求める ID 体験を実現する方法","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001cbarAAA-aPA4z0000008OZTGA2"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:39.774Z","title":"誰でもわかる顧客のアイデンティティおよびアクセス管理 (CIAM)","id":"ciam-for-dummies-jp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Zatc6bwOnNMdkKflsQzF5","type":"Asset","createdAt":"2021-10-28T16:29:19.377Z","updatedAt":"2021-10-28T16:29:19.377Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAMは何ですか","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3Zatc6bwOnNMdkKflsQzF5/560b8d057976d9144ba4ba74a7f0382a/Okta_CIAM_Auth0_WH200_JP.png","details":{"size":200663,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_JP.png","contentType":"image/png"}}},"description":"ユーザー名とパスワードは、今や日常生活の一部となっています。オンラインショッピング、銀行口座、モバイルアプリなど、消費者はさまざまなアカウントを管理しています。 これが顧客のアイデンティティおよびアクセス管理(CIAM)です。適切なCIAMと不適切な CIAMの違いについては、多様なデジタルエクスペリエンスの中で誰でもある程度は認識し ていることでしょう。たとえば、モバイルバンキングのアプリを使うときには、指紋や顔 のスキャンで認証するだけで、堅固なセキュリティや利便性の高さを実感できるのではな いでしょうか。逆に、オンラインショッピングで長い登録プロセスが必要となるために、 カートを放棄した経験が一度ならずあるという人も多いでしょう。欲しい商品を見つける 以上に、登録に時間がかかってしまうことは珍しくありません。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3k2d5Ac4jIu4kINQ5ZNSVT","type":"Asset","createdAt":"2021-10-28T16:46:55.424Z","updatedAt":"2021-10-28T16:46:55.424Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAMとは?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3k2d5Ac4jIu4kINQ5ZNSVT/f05100c5de5a66592ee63e94d5b71465/Auth0-eBook-CIAM-for-Dummies-JP-share-asset.png","details":{"size":249483,"image":{"width":1250,"height":608}},"fileName":"Auth0-eBook-CIAM-for-Dummies-JP-share-asset.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3KnnUQs5QRomwncjmlY3Ms","type":"Asset","createdAt":"2021-10-28T16:33:29.029Z","updatedAt":"2021-10-28T16:33:29.029Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAMとは?","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/3KnnUQs5QRomwncjmlY3Ms/1cb76e5b7dd30c90df3dc9ff6e9af526/Auth0-eBook-CIAM-for-Dummies-JP.pdf","details":{"size":2928621},"fileName":"Auth0-eBook-CIAM-for-Dummies-JP.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"ユーザー名とパスワードは、今や日常生活の一部となっています。オンラインショッピング、銀行口座、モバイルアプリなど、消費者はさまざまなアカウントを管理しています。 これが顧客のアイデンティティおよびアクセス管理(CIAM)です。","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5x7RisERPc9q4hsqAQeJmu","type":"Entry","createdAt":"2021-10-28T16:48:51.864Z","updatedAt":"2021-10-28T16:48:51.864Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"JP","ocid":"7014z000001cb7eAAA-aPA4z000000015kGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:39.460Z","title":"Guía de administración de identidades y acceso de clientes (CIAM)","id":"ciam-for-dummies-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5fqRarCWScVr8jM3S2obBH","type":"Asset","createdAt":"2021-10-20T09:20:46.953Z","updatedAt":"2021-10-20T09:20:46.953Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM for Dummies (Spanish)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5fqRarCWScVr8jM3S2obBH/4a974f2ec4b43e79864bbf0e092f43da/Okta_CIAM_Auth0_WH200_ES__1_.png","details":{"size":239116,"image":{"width":600,"height":856}},"fileName":"Okta_CIAM_Auth0_WH200_ES (1).png","contentType":"image/png"}}},"description":"Sin duda, alguna vez has utilizado la administración de identidades y acceso de clientes (CIAM, Customer Identity and Access Management) en tu vida personal como cliente de otras empresas. Quizás has iniciado sesión en un sitio web para comprar una entrada para un concierto, o igual has utilizado la cuenta de una de tus redes sociales para entrar en un sitio de comercio electrónico nuevo. O puede que hayas utilizado el móvil para hacer gestiones online en la aplicación del banco y te hayan enviado un código de un solo uso por mensaje de texto para entrar en tu cuenta. Estos son algunos ejemplos cotidianos de cómo los clientes ya utilizan sistemas de CIAM en sus aplicaciones, sitios web y portales favoritos.\n\nEn este libro, descubrirás cómo pueden las soluciones de CIAM modernas ayudar a tu empresa a ofrecer experiencias digitales seguras y fluidas para tus clientes y partners.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"112lNiEKwls809Kvsdaa1W","type":"Asset","createdAt":"2021-10-20T09:22:09.720Z","updatedAt":"2021-10-20T09:22:09.720Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM for Dummies Share (Spanish)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/112lNiEKwls809Kvsdaa1W/1bdc80df91e6f1a01dffa1a7cab61804/_Share_Asset__Guide__Horizontal__-_Spanish.png","details":{"size":137099,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] Guide (Horizontal) - Spanish.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"R7kKxIKaNfhc7rM3FYqPv","type":"Asset","createdAt":"2021-10-20T09:23:05.702Z","updatedAt":"2021-10-20T09:23:05.702Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM for Dummies (Spanish File)","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/R7kKxIKaNfhc7rM3FYqPv/d548da25d37215f14b24d62c2b4b1510/CIAM_for_Dummies_-_Spanish.pdf","details":{"size":4674211},"fileName":"CIAM for Dummies - Spanish.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"*Guía de administración de identidades y acceso de clientes (CIAM) For Dum- mies*, edición especial de Auth0, consta de ocho capítulos que abarcan las siguientes cuestiones:\n\n- Los conceptos básicos de CIAM\n- Por qué CIAM es más importante ahora que nunca\n- Por qué no deberías intentar crear una solución de CIAM por tu cuenta\n- Qué es una solución de CIAM moderna y cómo puede ayudar a tu organización\n- Qué debes buscar en una solución de CIAM moderna para tu organización\n- Triunfar gracias a una solución de CIAM adaptada a las necesida- des de tu negocio\n- El futuro de CIAM\n- Diez aspectos importantes que debe incluir una solución de CIAM\npara que tu empresa triunfe\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6IZinNsSdzmqDWwL1ettgN","type":"Entry","createdAt":"2021-10-21T16:10:38.937Z","updatedAt":"2021-10-21T16:10:38.937Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"Primer Lanzamiento"}}],"language":"ES","ocid":"7014z000001cb7fAAA-aPA4z000000015lGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:36.653Z","title":"CIAM pour les nuls","id":"ciam-pour-les-nuls","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7zWpcgzbwwd5nhC9ZSfLnH","type":"Asset","createdAt":"2021-09-24T16:04:28.799Z","updatedAt":"2021-09-24T16:04:28.799Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM pour les nuls","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7zWpcgzbwwd5nhC9ZSfLnH/d4da0ea7a63f70caa49d95d74b25e91b/Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Preview.png","details":{"size":182828,"image":{"width":600,"height":856}},"fileName":"Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Preview.png","contentType":"image/png"}}},"description":"Téléchargez votre guide gratuit et découvrez:\n- En quoi consiste le CIAM et pourquoi cette technologie est devenue indispensable\n- Les fonctionnalités importantes dans la sélection d’une solution CIAM\n- Les dix étapes d’implémentation d’une solution CIAM répondant à vos besoins","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6sq2yzllffOtEdfgMfcIcS","type":"Asset","createdAt":"2021-09-24T16:05:06.594Z","updatedAt":"2021-09-24T16:05:06.594Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM pour les nuls","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6sq2yzllffOtEdfgMfcIcS/66c016bfc56ad828ba6a2fdf539b402c/Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Share-Asset.jpeg","details":{"size":124335,"image":{"width":1250,"height":608}},"fileName":"Auth0-eBook-2021-09-Customer-Identity-Access-Management-French-Share-Asset.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"50Av6V3AEFxUoXlPQxkI9","type":"Asset","createdAt":"2021-09-24T16:05:31.868Z","updatedAt":"2021-09-24T16:05:31.868Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM pour les nuls","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/50Av6V3AEFxUoXlPQxkI9/9df2f5bd91066083738c38f07b5193a9/Auth0-eBook-2021-09-Customer-Identity-Access-Management-French.pdf","details":{"size":2765007},"fileName":"Auth0-eBook-2021-09-Customer-Identity-Access-Management-French.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"CIAM for Dummies - French Edition","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001cbB6AAI-aPA4z000000015jGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:36.013Z","title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","id":"idaas-fur-dummies-ihr-handbuch-zu-identity-as-a-service","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1grL6iMUxyodXxASzTBorz","type":"Asset","createdAt":"2021-09-23T21:02:20.955Z","updatedAt":"2021-09-23T21:02:20.955Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1grL6iMUxyodXxASzTBorz/7874eee1a2592b0b8a908fadefdd281f/Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Preview.png","details":{"size":179644,"image":{"width":600,"height":856}},"fileName":"Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Preview.png","contentType":"image/png"}}},"description":"Laden Sie jetzt das neue eBook \"Identity as a Service for Dummies\" herunter.\n\nDieses eBook ist Teil der klassischen \"For Dummies\"-Reihe und wird Sie durch das Konzept von IDaaS führen. Erfahren Sie mehr darüber:\n- die Bedeutung von Identity, was sie für Ihr Unternehmen bedeuten könnte und ihre Entwicklung\n- die Definition von \"Identity as a Service\" und wie Ihr Unternehmen davon profitieren kann\n- die neuen Trends und Innovationen für die Zukunft der Identity","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"70ciJFLJXhbiHqOU4fGit3","type":"Asset","createdAt":"2021-09-23T21:02:41.304Z","updatedAt":"2021-09-23T21:02:41.304Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/70ciJFLJXhbiHqOU4fGit3/16ea79ab4ac6b1f23840a8399ba47eda/Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Share-Asset.jpeg","details":{"size":127483,"image":{"width":1250,"height":608}},"fileName":"Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German-Share-Asset.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"79uwAp7SDx3i1leAceK0d6","type":"Asset","createdAt":"2021-09-23T21:03:14.144Z","updatedAt":"2021-09-23T21:03:14.144Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS für Dummies: Ihr Handbuch zu Identity as a Service","description":"","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/79uwAp7SDx3i1leAceK0d6/fccb6454404cb4d17384c581a5e6a624/Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German.pdf","details":{"size":2763414},"fileName":"Auth0-eBook-2021-09-Identity-as-a-Service-for-Dummies-German.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Dieses Handbuch gehört zur klassischen „Für Dummies“-Reihe und bietet eine Einführung in die wichtigsten IDaaS-Konzepte","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbBSAAY-aPA4z0000000146GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:34.982Z","title":"Sicherheit in der Cloud: Identitätsmanagement und Risikominderung","id":"security-in-the-cloud-de","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"pnMysFoGVT1X5x7otCWKa","type":"Asset","createdAt":"2021-07-12T15:46:39.292Z","updatedAt":"2021-07-12T15:46:39.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Security in the Cloud - DE","file":{"url":"//images.ctfassets.net/2ntc334xpx65/pnMysFoGVT1X5x7otCWKa/0d9be078df76780303160b03e10a4800/LP_Cover_-_AWS_-_DE.jpeg","details":{"size":134818,"image":{"width":600,"height":856}},"fileName":"LP Cover - AWS - DE.jpeg","contentType":"image/jpeg"}}},"description":"Laut einer IDSA-Umfrage unter 502 Sicherheits-Entscheidungsträger waren 79 % der Unternehmen in den letzten zwei Jahren von einem identitätsbezogenen Sicherheitsverstoß betroffen. Mit der rasanten Zunahme von Telearbeit und der Migration von Unternehmen zu Cloud-basierten Anwendungen wird sich dieses Problem nur noch verschärfen.\n\nDamit Unternehmen die wachsenden Anforderungen des Cloud-basierten Computings erfüllen können, müssen sie sicherstellen, dass sie über eine robuste, skalierbare IAM-Lösung verfügen.\n\nErfahren Sie mehr über einige der wichtigsten Herausforderungen im Identitätsmanagement, mit denen Unternehmen heute konfrontiert sind. Lernen Sie über die wichtigsten Trends und Lösungen, um einen Einblick in unsere eigenen Abläufe und die laufende Beziehung mit der AWS Cloud Platform zu bekommen.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4eWw0pui3WozX33M8dZWVf","type":"Asset","createdAt":"2021-07-12T15:47:05.256Z","updatedAt":"2021-07-12T15:47:21.700Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Security in the Cloud - DE","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4eWw0pui3WozX33M8dZWVf/8d8d7732e015eb920637cc5fe4f7f3b0/-Share_Asset-__Horizontal__AWS-DE.png","details":{"size":263774,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] (Horizontal) AWS-DE.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6UVr7O7qtWW7dP8344YhXJ","type":"Asset","createdAt":"2021-07-12T15:47:46.814Z","updatedAt":"2021-07-12T15:47:46.814Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Security in the Cloud - DE","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6UVr7O7qtWW7dP8344YhXJ/4c75871695515b87032d256f61e28a3a/EBook_-_DE_-_Security_in_the_Cloud_-_Identit___ts-_und_Zugriffsmanagement_und_Risikominderung.pdf","details":{"size":415378},"fileName":"EBook - DE - Security in the Cloud - Identit ts- und Zugriffsmanagement und Risikominderung.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Sicherheit in der Cloud: Identitäts- und Zugriffsmanagement und Risikominderung","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"DE","ocid":"7014z000001cbBOAAY-aPA4z0000000130GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:08:34.665Z","title":"Comment la gestion des identités stimule l'innovation du Cloud","id":"security-in-the-cloud-fr","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7GnJXoqIS51A8nBDNlxirg","type":"Asset","createdAt":"2021-07-09T23:36:26.106Z","updatedAt":"2021-07-09T23:36:26.106Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"La sécurité dans le cloud: Gestion des identités et des accès","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7GnJXoqIS51A8nBDNlxirg/9d90bcb59c60cebbb43b13d4bef99fb4/LP_Cover_-_AWS-FR.jpeg","details":{"size":137004,"image":{"width":600,"height":856}},"fileName":"LP Cover - AWS-FR.jpeg","contentType":"image/jpeg"}}},"description":"Selon une enquête IDSA menée auprès de 502 décideurs dans le domaine de la sécurité, 79 % des organisations ont connu une faille de sécurité liée à l'identité au cours des deux dernières années. Compte tenu de l'augmentation rapide du télétravail et de la migration des entreprises vers des applications basées sur le cloud, ce problème ne va que s'aggraver. Pour pouvoir répondre à la demande croissante en informatique basée sur le cloud, les entreprises devront s'assurer qu'elles disposent d'une solution IAM robuste et évolutive.\n\nDans cet ebook, nous identifions certains des principaux défis de gestion des identités auxquels sont confrontées les entreprises aujourd'hui. Nous explorons les principales tendances et proposons des solutions, en donnant un aperçu sur notre propre fonctionnement et sur la relation continue avec la plate-forme AWS Cloud.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4woLWW7RK8gbcRE4lzaE3a","type":"Asset","createdAt":"2021-07-09T23:40:59.383Z","updatedAt":"2021-07-09T23:40:59.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Share Asset] (Horizontal) AWS-FR","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4woLWW7RK8gbcRE4lzaE3a/ce20cd488ee4ffb10b6e32fe7c581363/-Share_Asset-__Horizontal__AWS-FR.png","details":{"size":252874,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] (Horizontal) AWS-FR.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"71UGTxgTZ3LQA29xt5wLGN","type":"Asset","createdAt":"2021-07-09T23:37:04.542Z","updatedAt":"2021-07-09T23:37:04.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"La sécurité dans le cloud: Gestion des identités et des accès","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/71UGTxgTZ3LQA29xt5wLGN/f7c8765e7c14d6af1f0c0496e4ec3b73/Security_in_the_Cloud_-_Gestion_des_identite__s_et_des_acce__s_et_atte__nuation_des_risques.pdf","details":{"size":406510},"fileName":"Security in the Cloud - Gestion des identités et des accès et atténuation des risques.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"content":"Title\nLa sécurité dans le cloud: Gestion des identités et des accès et atténuation des risques\n","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2etyIhz8vr6XIKwucltpl0","type":"Entry","createdAt":"2019-11-11T17:22:36.258Z","updatedAt":"2021-10-20T09:01:31.595Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0"}}],"language":"FR","ocid":"7014z000001cbAnAAI-aPA4z0000000132GAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:07:39.377Z","title":"#keineAblenkungen: ein eBook","id":"keine-ablenkungen-ein-eBook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5hercciE5JfXNhqo36zyqk","type":"Asset","createdAt":"2020-04-28T16:13:07.413Z","updatedAt":"2020-04-28T16:14:28.023Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":41,"revision":2,"locale":"en-US"},"fields":{"title":"#nodistractions_eBook_DE","description":"DE Version of #nodistractions eBook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5hercciE5JfXNhqo36zyqk/3b4046e3c52379cf8d3f9df7453e35f4/aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","details":{"size":72479,"image":{"width":600,"height":856}},"fileName":"aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","contentType":"image/jpeg"}}},"description":"Wie können Unternehmen ein wettbewerbsfähiges Produkt\nschaffen und Marktführer werden? Wie können Einzelhändler\nin Krisenzeiten Tausende von Geschäften in mehreren\nLändern eröffnen? Wie können Versorgungsunternehmen auf\nhart umkämpften Energiemärkten erfolgreich agieren?\n\nIn diesem eBook werden einige der Faktoren erörtert, die es Unternehmen erleichtern, ihre Strategie an ihrer technischen Entwicklung auszurichten:\n\n- Zentralisierung von Systemen\n- Eliminierung technischer Schulden und Risikominimierung\n- Schnellere Markteinführung von Innovationen für Produkte, Anwendungen und Dienste","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4cdHKt6BHwNSGRWl0ZvkOu","type":"Asset","createdAt":"2020-04-28T16:13:14.298Z","updatedAt":"2024-04-05T13:06:08.175Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":31,"revision":3,"locale":"en-US"},"fields":{"title":"#nodistractions Twitter Card DE","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4cdHKt6BHwNSGRWl0ZvkOu/6e8b3f3719b2eebd3ad024bddae5c525/v24f16ClYizzKPg4TfrUX5LTJbT5DyfPB8aK39jW.jpeg","details":{"size":235834,"image":{"width":2400,"height":1260}},"fileName":"v24f16ClYizzKPg4TfrUX5LTJbT5DyfPB8aK39jW.jpeg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5rCSqfZvchl9qGVvuG196H","type":"Asset","createdAt":"2020-04-27T22:52:28.862Z","updatedAt":"2020-04-27T22:52:28.862Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"#keineAblenkungen: ein eBook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5rCSqfZvchl9qGVvuG196H/0d65f147d3eb4388411ed25ebe9a8063/_nodistractionseBook_German.pdf","details":{"size":1013329},"fileName":"#nodistractionseBook_German.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pCwC3LOGQT9FyZBHGJl73","type":"Entry","createdAt":"2019-11-21T23:54:50.459Z","updatedAt":"2019-11-21T23:54:50.459Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Jenny O'Brien","job_title":"Business Content Manager","twitter":"https://twitter.com/jenny_obrien","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1KpSm398RTsdbJzLoNzfvS","type":"Asset","createdAt":"2020-02-11T14:24:03.334Z","updatedAt":"2020-02-11T14:24:03.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"Jenny O'Brien","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1KpSm398RTsdbJzLoNzfvS/fd43cecb25001ba16e3daccf5f95d6f9/88sTtRBT_400x400.png","details":{"size":321409,"image":{"width":400,"height":400}},"fileName":"88sTtRBT_400x400.png","contentType":"image/png"}}},"bio":"I'm a former business journalist who's fascinated by the intersection of tech and business strategy — in particular how the right solution can transform an idea into reality. I specialize in ROI, data privacy, and identity."}},"content":"# Inhalt\n\n__1 Innovation__\n1.1 Anerkannt für die Erfüllung unterschiedlicher Anforderungen\t\n1.2 Geringeres Projektrisiko\t\n1.3 Unterstützung (und Bereitstellung) kontinuierlicher Innovation\n1.4 Zusammenarbeit bringt Erfolg\t\n\n__2 Markteinführungszeit__\n2.1 Keine Warterei auf den POC\t\n2.2 Wie schnell ist die Implementierung?\n2.3 Vorteile der Konzentration\t\n\n__3 Sicherheit__\n3.1 Geringeres Projektrisiko\n3.2 Vertrauenswürdigkeit durch Akkreditierung beweisen\n3.3 Betrügerischen Benutzern zuvorkommen\t\n3.4 Sicherheits-ROI\t\n\n__4 Datenpflege__\t\n4.1 Können Sie Ihren eigenen Erfolg sichern?\t\n4.2 Müssen Ihre Innovationen warten?\n4.3 Lässt sich Ihr System problemlos und schnell skalieren?\n4.4 Worauf liegt Ihr Schwerpunkt?\n\n__5 Wie hoch ist der wahre ROI bei Nutzung eines Dienstes wie Auth0?__\t\n5.1 Anerkennung\t\n5.2 Zukunftssicherung\n5.3 Sorgenfreiheit\n5.4 Das beste Angebot","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7gL54JvVCzjNlQv2hGJsgF","type":"Entry","createdAt":"2020-04-28T16:13:23.521Z","updatedAt":"2020-04-28T16:13:23.521Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"DE","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Cr9CZ92pRYBvmXQYtR7Cb","type":"Asset","createdAt":"2020-10-13T22:48:24.145Z","updatedAt":"2020-10-13T22:48:24.145Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"No distractions","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5Cr9CZ92pRYBvmXQYtR7Cb/3fa4d7e7206c11a0d4640e9453148cc6/no_distractions_thumb.jpg","details":{"size":32565,"image":{"width":581,"height":388}},"fileName":"no_distractions_thumb.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5hercciE5JfXNhqo36zyqk","type":"Asset","createdAt":"2020-04-28T16:13:07.413Z","updatedAt":"2020-04-28T16:14:28.023Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":41,"revision":2,"locale":"en-US"},"fields":{"title":"#nodistractions_eBook_DE","description":"DE Version of #nodistractions eBook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5hercciE5JfXNhqo36zyqk/3b4046e3c52379cf8d3f9df7453e35f4/aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","details":{"size":72479,"image":{"width":600,"height":856}},"fileName":"aT54mFQvThA6HmPcBIG3ZXl5z5moDaCEZGpEkvWa.jpeg","contentType":"image/jpeg"}}},"ocid":"7014z000001cbBJAAY-aPA4z000000011nGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:12.836Z","title":"AWS と Auth0 の 強力な連携のメリット","id":"jp-aws-auth0-ebook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"24stzlxfvboPSUITgJ7N9O","type":"Asset","createdAt":"2020-03-23T06:33:09.081Z","updatedAt":"2020-03-27T15:43:04.043Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"JP-Why-AWS-Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/24stzlxfvboPSUITgJ7N9O/53baf57d17847524b294f48e86f42326/JP-Why-AWS-Auth0.png","details":{"size":265088,"image":{"width":600,"height":856}},"fileName":"JP-Why-AWS-Auth0.png","contentType":"image/png"}}},"description":"この Eブックでは、どのように Auth0 と AWS が協力し、AWS のお客様が自身のアプリケーションに必要なアイデンティティソリューションを素早く、容易に実装できるようにするか解説しています。\n\n本書は以下のようなコンテンツを含みます:\n\n- ID を短時間で接続し、実行するための事前準備\n- アドバンストなセキュリティアーキテクチャの考慮\n- カスタムオーソライザーを使用した API ゲートウェイのための Auth0 設定方法\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1YQ922N4ODfa4cN3wXp9i2","type":"Asset","createdAt":"2020-03-25T01:47:25.892Z","updatedAt":"2020-03-27T15:43:30.758Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"TC-Why-AWS-Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1YQ922N4ODfa4cN3wXp9i2/4f2c79b48793f5085457d527ddb37226/TC-Why-AWS-Auth0.png","details":{"size":667345,"image":{"width":2400,"height":1260}},"fileName":"TC-Why-AWS-Auth0.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Co4TsE8pIPzyy19iRAM0v","type":"Asset","createdAt":"2020-03-23T06:39:36.850Z","updatedAt":"2020-03-23T06:39:36.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"JP-Why-AWS-Auth0","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5Co4TsE8pIPzyy19iRAM0v/00df6b64a1d23573536663260f758abb/JP-Why-AWS-Auth0.pdf","details":{"size":8622625},"fileName":"JP-Why-AWS-Auth0.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"__目次__\n__はじめに 5\nセキュリティを重視した設計 7__\n最新のセキュリティを組み込んだアーキテクチャ 8\nロードマップに基づいた最新脅威の検出 9\n__自由度を広げた AWS セキュリティスキャン 11__\n新しいポリシーがセキュリティ チームに与える影響 11\nAuth0 における取り組み 12\n手作業から自動ソリューションへ 15\n__AWS/API Gateway の設定方法 16__\nAPI Gateway カスタム オーソライザーの動作 18\n作業を始める前に 19\n次のステップ 19\nステップ 1 - Auth0 を構成する 19\nステップ 2 - Gateway API をインポートおよびデプロイする 23\nステップ 3 - カスタム オーソライザーを作成する 33\nステップ 4 - カスタム オーソライザーを使用して API を保護する 46\n__関連資料 50\nベスト プラクティスとプロジェクト計画 50\nお問い合わせ 52__","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6EV6dPGAQu3IZOTTAqPoEp","type":"Entry","createdAt":"2020-02-10T21:21:09.736Z","updatedAt":"2021-10-21T16:10:03.220Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"JP","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4fh0COZzI0CsXEnTHotWxh","type":"Asset","createdAt":"2020-10-13T22:52:34.765Z","updatedAt":"2020-10-13T22:52:34.765Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"AWS + Hands","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4fh0COZzI0CsXEnTHotWxh/ad77511ae6749461a0ea6d21db86faf0/aws_thumb.jpg","details":{"size":32011,"image":{"width":581,"height":388}},"fileName":"aws_thumb.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"24stzlxfvboPSUITgJ7N9O","type":"Asset","createdAt":"2020-03-23T06:33:09.081Z","updatedAt":"2020-03-27T15:43:04.043Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"JP-Why-AWS-Auth0","file":{"url":"//images.ctfassets.net/2ntc334xpx65/24stzlxfvboPSUITgJ7N9O/53baf57d17847524b294f48e86f42326/JP-Why-AWS-Auth0.png","details":{"size":265088,"image":{"width":600,"height":856}},"fileName":"JP-Why-AWS-Auth0.png","contentType":"image/png"}}},"ocid":"7014z000001cb22AAA-aPA4z000000011fGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:12.493Z","title":"#pasdedistractions: un eBook","id":"pas-de-distractions-un-ebook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4w5IFxAmZpnzSUsShcvktm","type":"Asset","createdAt":"2020-05-21T15:18:42.049Z","updatedAt":"2020-05-21T15:23:59.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Twitter Banner french-03","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4w5IFxAmZpnzSUsShcvktm/6ebcf33a7cbc32f4038d3d8976afa4c5/Twitter_Banner_french-03.jpg","details":{"size":73758,"image":{"width":600,"height":856}},"fileName":"Twitter Banner_french-03.jpg","contentType":"image/jpeg"}}},"description":"Comment une entreprise crée-t-elle un produit courant et devient-elle un leader du marché ? Comment un commerçant ouvre-t-il des milliers de magasins, dans plusieurs pays, alors que la crise économique fait rage ? Comment un prestataire de services publics prospère-t-il dans un marché énergétique engorgé ?\n\nCe livre électronique examine certains des facteurs qui font que les entreprises alignent leur stratégie sur leur développement technique, ce qui facilite la tâche :\n\n- Centraliser les systèmes\n- Éliminer la dette technique et atténuer les risques\n- Mettre plus rapidement sur le marché des innovations dans leurs produits, applications et services","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5zrZvSuVYmbNFsefIigznR","type":"Asset","createdAt":"2020-05-21T15:19:06.458Z","updatedAt":"2020-05-21T15:19:06.458Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":1,"locale":"en-US"},"fields":{"title":"#pasdedistractions Twitter Card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5zrZvSuVYmbNFsefIigznR/98a8b789f0031f1c2f4e13c1220316ce/Twitter_Banner_french-01__1_.jpg","details":{"size":1626120,"image":{"width":10000,"height":5251}},"fileName":"Twitter Banner_french-01 (1).jpg","contentType":"image/jpeg"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6u2a7jX9P1cidEreE4hWDs","type":"Asset","createdAt":"2020-05-21T15:17:01.696Z","updatedAt":"2020-05-21T15:17:01.696Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"#pasdedistractions eBook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6u2a7jX9P1cidEreE4hWDs/af14e9b4682212ddef2fae7f3971c332/No_Distractions_final_French_2.pdf","details":{"size":1689766},"fileName":"No Distractions_final_French_2.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pCwC3LOGQT9FyZBHGJl73","type":"Entry","createdAt":"2019-11-21T23:54:50.459Z","updatedAt":"2019-11-21T23:54:50.459Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Jenny O'Brien","job_title":"Business Content Manager","twitter":"https://twitter.com/jenny_obrien","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1KpSm398RTsdbJzLoNzfvS","type":"Asset","createdAt":"2020-02-11T14:24:03.334Z","updatedAt":"2020-02-11T14:24:03.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"Jenny O'Brien","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1KpSm398RTsdbJzLoNzfvS/fd43cecb25001ba16e3daccf5f95d6f9/88sTtRBT_400x400.png","details":{"size":321409,"image":{"width":400,"height":400}},"fileName":"88sTtRBT_400x400.png","contentType":"image/png"}}},"bio":"I'm a former business journalist who's fascinated by the intersection of tech and business strategy — in particular how the right solution can transform an idea into reality. I specialize in ROI, data privacy, and identity."}},"content":"# Contentu\n\n__1 Innovation__\n1.1 Reconnu pour répondre à différents besoins\n1.2 Réduire les risques liés aux projets\n1.3 Soutenir (et fournir) l'innovation continue\n1.4 La collaboration contribue à la réussite\n\n__2 Le temps de mise sur le marché__\n2.1 Dépassez l'attente de faisabilité d'un POC\n2.2 Quelle est la durée de la mise en oeuvre?\n2.3 L'avantage de la concentration\t\n\n__3 Sécurité__\n3.1 Réduire les risques liés aux projets\n3.2 Établir la confiance grâce à l'accréditation\n3.3 Avoir l'avantage sur les utilisateurs frauduleux\t\n3.4 Retour sur investissement de la sécurité\n\n__4 Entretien__\t\n4.1 Serez-vous à la hauteur de votre succès?\n4.2 Vos innovations vont-elles devoir attendre?\n4.3 Pouvez-vous évoluer facilement et rapidement?\n4.4 Sur quoi concentrez-vous vos efforts?\n\n__5 Quel est le véritable retour sur investissement d'Auth0?__\t\n5.1 Reconnaissance\n5.2 Pérennité\n5.3 Tranquillité d'esprit\t\n5.4 La meilleure offre","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2rj2rA2VXYpwsrHhX7B39k","type":"Entry","createdAt":"2020-05-21T15:18:37.036Z","updatedAt":"2020-05-21T15:18:37.036Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"FR","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5Cr9CZ92pRYBvmXQYtR7Cb","type":"Asset","createdAt":"2020-10-13T22:48:24.145Z","updatedAt":"2020-10-13T22:48:24.145Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"No distractions","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5Cr9CZ92pRYBvmXQYtR7Cb/3fa4d7e7206c11a0d4640e9453148cc6/no_distractions_thumb.jpg","details":{"size":32565,"image":{"width":581,"height":388}},"fileName":"no_distractions_thumb.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4w5IFxAmZpnzSUsShcvktm","type":"Asset","createdAt":"2020-05-21T15:18:42.049Z","updatedAt":"2020-05-21T15:23:59.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Twitter Banner french-03","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4w5IFxAmZpnzSUsShcvktm/6ebcf33a7cbc32f4038d3d8976afa4c5/Twitter_Banner_french-03.jpg","details":{"size":73758,"image":{"width":600,"height":856}},"fileName":"Twitter Banner_french-03.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cbAkAAI-aPA4z000000011oGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.690Z","title":"認証サバイバルガイド","id":"jp-authentication-survival-guide","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2kvJZK6pulwPmJoQZG3EeD","type":"Asset","createdAt":"2020-03-09T02:06:56.252Z","updatedAt":"2020-03-10T21:41:25.399Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-authentication-survival-guide-coverimage","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2kvJZK6pulwPmJoQZG3EeD/3037108405588053c1e4b7b912003f3e/jp-authentication-survival-guide-coverimage.png","details":{"size":88970,"image":{"width":600,"height":856}},"fileName":"jp-authentication-survival-guide-coverimage.png","contentType":"image/png"}}},"description":"本書は、認証に関わりはじめた方々に、初めの一歩としてお読みいただくことを目的としてつくられています。\n認証を実装する際に出会うであろう全ての主要のプロトコル、フォーマット、コンセプトそして定義について、一通り説明しています。\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3kzEyfqiRnksUxDbopWpMX","type":"Asset","createdAt":"2020-03-09T02:08:20.056Z","updatedAt":"2020-03-09T02:08:20.056Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"TC-Survival Guide-ebook-japanese","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3kzEyfqiRnksUxDbopWpMX/4ca522abb2c73068e2ab8436c6ee1021/TC-Survival_Guide-ebook-japanese.png","details":{"size":219685,"image":{"width":2400,"height":1260}},"fileName":"TC-Survival Guide-ebook-japanese.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6YP9RogNcUn8PzevHgdG9y","type":"Asset","createdAt":"2020-03-09T02:10:16.996Z","updatedAt":"2020-03-09T02:10:16.996Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication Survival Guide","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/6YP9RogNcUn8PzevHgdG9y/9c882bea311f1f9925a20014328fed3a/Authentication_Survival_Guide.pdf","details":{"size":327263},"fileName":"Authentication Survival Guide.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"__目次__\n\n__謝辞 4\nはじめに 5\nコンセプト 7\nOAuth 2.0 8\nOpenID Connect 12\nエンタープライズプロトコル 14__\nSAML 15\nWS-Federation 16\n__過去のプロトコルについての考察(OpenIDとOAuth 1.0a) 18\nトークンオーバーロード 19__\nフォーマット 20\nタイプ 22\nトークンの保存  27\nでもCookieが好き 31\n__トラブルシューティング 33__\nそれはただのHTTPSに過ぎない 33\nツール 36\n__隠れた危険性について 38\n用語集 40__","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6EV6dPGAQu3IZOTTAqPoEp","type":"Entry","createdAt":"2020-02-10T21:21:09.736Z","updatedAt":"2021-10-21T16:10:03.220Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"JP","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7cdhrdiJpVl7rCmcNtYTXa","type":"Asset","createdAt":"2020-09-29T22:11:20.721Z","updatedAt":"2020-09-29T22:11:20.721Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Authentication Survival Guide","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7cdhrdiJpVl7rCmcNtYTXa/0125e1d15d01453d2f5b1d6a5b9e7be6/resource_thumb_45.jpg","details":{"size":92810,"image":{"width":581,"height":388}},"fileName":"resource_thumb_45.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2kvJZK6pulwPmJoQZG3EeD","type":"Asset","createdAt":"2020-03-09T02:06:56.252Z","updatedAt":"2020-03-10T21:41:25.399Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-authentication-survival-guide-coverimage","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2kvJZK6pulwPmJoQZG3EeD/3037108405588053c1e4b7b912003f3e/jp-authentication-survival-guide-coverimage.png","details":{"size":88970,"image":{"width":600,"height":856}},"fileName":"jp-authentication-survival-guide-coverimage.png","contentType":"image/png"}}},"ocid":"7014z000001cb0cAAA-aPA4z000000010uGAA"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.356Z","title":"THE OPENID CONNECT ハンドブック","id":"jp-the-openid-connect-handbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6tROG8J1DwAz2jU5Wmabp8","type":"Asset","createdAt":"2020-02-27T05:40:35.102Z","updatedAt":"2020-03-04T17:21:58.371Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-the-openid-connect-handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6tROG8J1DwAz2jU5Wmabp8/58fede9ad28d23bc49d45c0825550d0f/jp-the-openid-connect-handbook.png","details":{"size":97377,"image":{"width":600,"height":856}},"fileName":"jp-the-openid-connect-handbook.png","contentType":"image/png"}}},"description":"OpenID Connect は、現代の認証に対応するためのデファクトスタンダードです。伝統的なウェブアプリケーションからシングルページアプリケーションに至るまで、OpenID Connect は安全かつシームレスにアイデンティティ管理を組み込みやすくする相互運用性に優れたテンプレートを提供しています。\n\nどのようにOpenID Connect が機能し、また今日のセキュリティとユーザーエクスペリエンスを強化するために活用できるのかを学びましょう。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6JKccwNUMx8OQNjJNYBoV5","type":"Asset","createdAt":"2020-03-01T11:43:43.717Z","updatedAt":"2020-03-04T17:22:44.533Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-the-openid-connect-handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6JKccwNUMx8OQNjJNYBoV5/5f97769c2e59201cdc16d5222e28ac94/jp-the-openid-connect-handbook.png","details":{"size":350916,"image":{"width":2400,"height":1260}},"fileName":"jp-the-openid-connect-handbook.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5r2ozpfZopwqXGRxwipk9H","type":"Asset","createdAt":"2020-02-27T05:45:41.042Z","updatedAt":"2020-02-27T09:06:33.981Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"jp-the-openid-connect-handbook","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5r2ozpfZopwqXGRxwipk9H/db4a4edda5e270cc9989c1fd5feeede0/jp-the-openid-connect-handbook.pdf","details":{"size":3268848},"fileName":"jp-the-openid-connect-handbook.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"__目次__\n\n__はじめに 4__\nエンティティとアイデンティティについて 5\n認証と認可 6\nまとめ 8\n\n__OpenID Connectの概要 9__\nアプリケーションプロトコルの概説 10\nOpenID Connectの仕組み 13\nOAuth 2.0の概要 15\nOpenID Connectのユースケース 17\nまとめ 18\n\n__OpenID Connectの実行 20__\nAuth0アカウントの作成 21\n前提条件\t22\n\n__OpenID Connectと従来のウェブアプリケーション 24__\nOpenID Connectと認証フロー 25\nプロジェクトのブートストラップ 25\n通常のウェブアプリケーションをAuth0に登録する 26\nFetching Information from the Discovery Endpoint 28\n認証プロセスの開始 30\n認証コールバックへの対処 35\nユーザーに関する詳細情報の要求 40\nユーザー認証にSDKを使用する 41\nまとめ 46\n\n__従来のウェブアプリケーションと委任認可フロー 47__\n認可コードフロー 48\nリソースサーバーを使用する 49\n委任認可のリクエスト 53\n委任認可のリクエストにSDKを使用 61\nまとめ 64\n\n__OpenID Connectとシングルページアプリケーション 65__\nSPAの認証処理 65\n非推奨のインプリシットグラントの代替手段について 66\nシングルページアプリケーションをAuth0に登録 67\nプロジェクトのブートストラップ 69\nSPAとOIDCプロバイダを統合 71\nSPAとOIDCプロバイダを統合 – 簡単な方法 78\nまとめ 83","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1UEmgPvGAagcFcOkYRXsXx","type":"Entry","createdAt":"2020-02-27T05:48:58.264Z","updatedAt":"2020-02-27T05:48:58.264Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"JP","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4b8vbdYm2oFuGDVkOBspzn","type":"Asset","createdAt":"2020-09-29T22:49:26.258Z","updatedAt":"2020-09-29T22:49:26.258Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4b8vbdYm2oFuGDVkOBspzn/aace682264e2ba60457d8b80ce439a3b/resource_thumb_39.jpg","details":{"size":43742,"image":{"width":581,"height":388}},"fileName":"resource_thumb_39.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6tROG8J1DwAz2jU5Wmabp8","type":"Asset","createdAt":"2020-02-27T05:40:35.102Z","updatedAt":"2020-03-04T17:21:58.371Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"jp-the-openid-connect-handbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6tROG8J1DwAz2jU5Wmabp8/58fede9ad28d23bc49d45c0825550d0f/jp-the-openid-connect-handbook.png","details":{"size":97377,"image":{"width":600,"height":856}},"fileName":"jp-the-openid-connect-handbook.png","contentType":"image/png"}}},"ocid":"7014z000001cb1LAAQ-aPA4z000000011KGAQ"},{"type":"ebooks","updatedAt":"2022-09-09T03:03:10.038Z","title":"JWT ハンドブック","id":"jp-jwt-handbook","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1eMvDoQtqlH53j9Mt5U933","type":"Asset","createdAt":"2020-03-27T03:22:09.921Z","updatedAt":"2020-03-31T21:48:06.983Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"jwt-handbook-jp","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1eMvDoQtqlH53j9Mt5U933/6d23f233fcce99a9a1fb6df425944e39/jwt-handbook-jp_Page_01.png","details":{"size":25924,"image":{"width":600,"height":856}},"fileName":"jwt-handbook-jp_Page_01.png","contentType":"image/png"}}},"description":"JWT がどのようにして誕生したのか、またどのような問題に取り組むために設計されたのか、不思議に思ったことはありませんか?\nJWT の署名や暗号化に利用できる数多くのアルゴリズムに興味がありますか?\nそれとも、できるだけ早く JWT を使いこなしたいと思っていますか?\n上記のような思いを持たれているのであれば、このハンドブックはあなたのためのものです。ぜひご一読ください。\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31xcPlh1ffh0uL70kSJqJg","type":"Asset","createdAt":"2020-03-30T02:40:21.820Z","updatedAt":"2020-03-31T21:47:52.484Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"TC-jwthandbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31xcPlh1ffh0uL70kSJqJg/f5f4fccf8f4a3d99ef10d83e8edc1177/TC-jwthandbook.png","details":{"size":189547,"image":{"width":2400,"height":1260}},"fileName":"TC-jwthandbook.png","contentType":"image/png"}}},"lead_data_is_required":true,"version":"1.0","book_files":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5HColfm15cUhMmDQnupNzd","type":"Asset","createdAt":"2020-03-27T03:19:47.811Z","updatedAt":"2020-03-27T03:19:47.811Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"jwt-handbook-jp","file":{"url":"//assets.ctfassets.net/2ntc334xpx65/5HColfm15cUhMmDQnupNzd/30d5913d94e79462043f6d8e3f557351/jwt-handbook-jp.pdf","details":{"size":3005410},"fileName":"jwt-handbook-jp.pdf","contentType":"application/pdf"}}}],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"content":"__目次__\n\n__目次 1\n謝辞 4\nはじめに 5__\n 1.1 JSON Web Token とは 5\n 1.2 JWT が解決する問題 6\n 1.3 JWT の簡単な歴史 6\n__実際の利用例 7__\n 2.1 クライアント側セッション/ステートレス セッション 7\n 2.1.1 セキュリティに関する考慮事項 8\n 2.1.1.1 署名の削除 8\n 2.1.1.2 クロスサイト リクエスト フォージェリ (CSRF) 8\n 2.1.1.3 クロスサイト スクリプティング (XSS) 9\n 2.1.2 クライアント側セッションの有用性 11\n 2.1.3 例 11\n2.2 フェデレーション アイデンティティ 14\n2.2.1 アクセス トークンとリフレッシュ トークン 15\n2.2.2 JWT と OAuth2 16\n2.2.3 JWT と OpenID Connect 16\n2.2.3.1 OpenIDConnect のフローと JWT 16\n2.2.4 例 16\n2.2.4.1 Node.js アプリのための Auth0 Lock のセットアップ 17\n__JSON Web Token の詳細 19__\n3.1 ヘッダー 20\n3.2 ペイロード 20\n3.2.1 登録済みクレーム 21\n3.2.2 パブリック クレームとプライベート クレーム 21\n3.3 セキュリティ保護のない JWT 23\n3.4 セキュリティ保護のない JWT の作成 23\n3.4.1 サンプル コード 24\n3.5 セキュリティ保護のない JWT の解析 24\n3.5.1 サンプル コード 24\n__JSON Web Signatures 26__\n4.1 署名付き JWT の構造 26\n4.1.1 コンパクト シリアライゼーションに使用されるアルゴリズムの概要 27\n4.1.2 署名アルゴリズムの実際的な側面 28\n4.1.3 JWS のヘッダー クレーム 30\n4.1.4 JWS JSON シリアライゼーション 31\n4.1.4.1 フラット化 JWS JSON シリアライゼーション 32\n4.2 トークンの署名と検証 32\n4.2.1 HS256: HMAC + SHA-256 33\n4.2.2 RS256: RSASSA + SHA256 33\n4.2.3 ES256: P-256 および SHA-256 を使用した ECDSA 33\n__JSON Web Encryption (JWE) 35__\n5.1 暗号化された JWT の構造 37\n5.1.1 鍵暗号化アルゴリズム 37\n5.1.1.1 鍵管理モード 38\n5.1.1.2 コンテンツ暗号化鍵 (CEK) と JWE 暗号化鍵 39\n5.1.2 コンテンツ暗号化アルゴリズム 40\n5.1.3 ヘッダー 40\n5.1.4 コンパクト シリアライゼーションに使用されるアルゴリズムの概要 41\n5.1.5 JWE JSON シリアライゼーション 41\n5.1.5.1 フラット化 JWE JSON シリアライゼーション 43\n5.2 トークンの暗号化と復号 43\n5.2.1 導入: node-jose を使用した鍵の管理 43\n5.2.2 AES-128 Key Wrap (鍵) + AES-128 GCM (コンテンツ) 44\n5.2.3 RSAES-OAEP (鍵) + AES-128 CBC + SHA-256 (コンテンツ) 45\n5.2.4 ECDH-ES P-256 (鍵) + AES-128 GCM (コンテンツ) 45\n5.2.5 ネストされた JWT: P-256 および SHA-256 を使用した ECDSA (署名) + RSAES-OAEP (暗号 化鍵) + AES-128 CBC + SHA-256 (暗号化コンテンツ) 45\n5.2.6 復号 46\n__JSON Web Key (JWK) 48__\n6.1 JSON Web Key の構造 49\n6.1.1 JSON Web Key Set 50\n__JSON Web Algorithms 51__\n7.1 一般的なアルゴリズム 51\n7.1.1 Base64 51\n7.1.1.1 Base64-URL 53\n7.1.1.2 サンプル コード 53\n7.1.2 SHA 54\n7.2 署名アルゴリズム 57\n7.2.1 HMAC 57\n7.2.1.1 HMAC + SHA256 (HS256) 59\n7.2.2 RSA 61\n7.2.2.1 e、d、n の選択 62\n7.2.2.2 基本的な署名方法 63\n7.2.2.3 RS256: SHA-256 を使用した RSASSA PKCS1 v1.5 63\n7.2.2.3.1 アルゴリズム 63\n7.2.2.3.1.1 EMSA-PKCS1-v1_5 プリミティブ 65\n7.2.2.3.1.2 OS2IP プリミティブ 65\n7.2.2.3.1.3 RSASP1 プリミティブ 65\n7.2.2.3.1.4 RSAVP1 プリミティブ 66\n7.2.2.3.1.5 I2OSP プリミティブ 66\n7.2.2.3.2 サンプル コード 66\n7.2.2.4 PS256: SHA-256 および MGF1 と SHA-256 を使用した RSASSA-PSS71 \nEMSA-PSS-ENCODE プリミティブ 72\n\n \n\n \n \n\n\n               \n\n点の 2 倍算点の加算 \n\n7.2.2.4.1 アルゴリズム  ...................................................................................................... 71\n7.2.3.1.1 7.2.3.1.2 7.2.3.1.3\n点の加算 .............................................................................................................. 78 点の 2 倍算 ........................................................................................................ 78 スカラー倍算 ...................................................................................................... 79\n7.2.2.4.1.1 7.2.2.4.1.2 7.2.2.4.1.3\nMGF1: マスク生成関数........................................................................... 72 EMSA-PSS-ENCODE プリミティブ...................................................... 72 EMSA-PSS-VERIFY プリミティブ........................................................ 73\n7.2.2.4.2 サンプル コード ................................................................................................ 75 7.2.3 楕円曲線 ................................................................................................................................................76 7.2.3.1 楕円曲線の演算.................................................................................................................. 78\n7.2.3.2 楕円曲線デジタル署名アルゴリズム (ECDSA)............................................................79 7.2.3.2.1 楕円曲線のドメイン パラメーター ................................................................ 81 7.2.3.2.2 公開鍵と秘密鍵 .................................................................................................. 81\n7.2.3.2.2.1 離散対数問題 ............................................................................................ 82 7.2.3.2.3 ES256: P-256 および SHA-256 を使用した ECDSA.................................... 82 7.3 今後の更新 ......................................................................................................................................................... 84\n付録 A: 現在のベスト プラクティス............................................................................................................................ 85\n8.1 隠れた危険とよく見られる攻撃 ..................................................................................................................... 85\n8.1.1 \"alg: none\" 攻撃 ....................................................................................................................................86\n8.1.2 RS256 公開鍵を HS256 共有シークレットとして使用する攻撃 ................................................87\n8.1.3 脆弱な HMAC 鍵 ................................................................................................................................88\n8.1.4 暗号化と署名検証の併用に関する誤解 ............................................................................................89\n8.1.5 無効な楕円曲線による攻撃 ................................................................................................................90\n8.1.6 置換攻撃 ................................................................................................................................................91\n8.1.6.1 受信者が異なる場合.......................................................................................................... 91\n8.1.6.2 受信者が同じ場合/Cross JWT ........................................................................................... 92\n8.2 対策とベストプラクティス ............................................................................................................................. 93\n8.2.1 アルゴリズムの検証を常に実行する ................................................................................................93\n8.2.2 適切なアルゴリズムを使用する ........................................................................................................94\n8.2.3 常にすべての検証を実行する ............................................................................................................94\n8.2.4 暗号の入力を必ず検証する ................................................................................................................94\n8.2.5 強力な鍵を選択する ............................................................................................................................94\n8.2.6 使用可能なすべてのクレームを検証する ........................................................................................94\n8.2.7 typ クレームを使用してトークンの種類を区別する ...................................................................95\n8.2.8 トークンごとに異なる検証ルールを使用する ................................................................................95\n8.3 まとめ ................................................................................................................................................................. 95","releases":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6EV6dPGAQu3IZOTTAqPoEp","type":"Entry","createdAt":"2020-02-10T21:21:09.736Z","updatedAt":"2021-10-21T16:10:03.220Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"ebooksRelease"}},"locale":"en-US"},"fields":{"version":"1.0","description":"First Release"}}],"language":"JP","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4TS8bn77xVXi1oU81gCG26","type":"Asset","createdAt":"2020-09-29T22:09:26.590Z","updatedAt":"2020-09-29T22:09:26.590Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"JWT","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4TS8bn77xVXi1oU81gCG26/156be2b2a6d08b8219174724a14f9889/resource_thumb_44.jpg","details":{"size":50286,"image":{"width":581,"height":388}},"fileName":"resource_thumb_44.jpg","contentType":"image/jpeg"}}},"push_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31xcPlh1ffh0uL70kSJqJg","type":"Asset","createdAt":"2020-03-30T02:40:21.820Z","updatedAt":"2020-03-31T21:47:52.484Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"TC-jwthandbook","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31xcPlh1ffh0uL70kSJqJg/f5f4fccf8f4a3d99ef10d83e8edc1177/TC-jwthandbook.png","details":{"size":189547,"image":{"width":2400,"height":1260}},"fileName":"TC-jwthandbook.png","contentType":"image/png"}}},"ocid":"7014z000001cb0VAAQ-aPA4z000000010nGAA"}],"resourcesType":"ebooks","metadata":{"noindex":false,"customPath":null,"title":"eBooks - Infographics, Handbooks, and Playbooks | Auth0","description":"Explore all Auth0 eBooks. Review detailed infographics and benefit from expert knowledge built into our handbooks and playbooks around identity.","image":{"url":"https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png","mimeType":"image/png"}},"lang":"en"},"__N_SSG":true},"page":"/resources/[resourcesType]","query":{"resourcesType":"ebooks"},"buildId":"_yI9ZUyEK_BOJO9ovBQ41","assetPrefix":"/b2b-enterprise-identity-management/vercel","isFallback":false,"isExperimentalCompile":false,"gsp":true,"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10