CINXE.COM
Webinars - Events, Introductions, and Testimonials | Auth0
<!DOCTYPE html><html lang="de"><head><title>Webinars - Events, Introductions, and Testimonials | Auth0</title><meta name="viewport" content="initial-scale=1.0, width=device-width"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=5"/><meta name="fragment" content="!"/><meta name="google-site-verification" content="KFViLMGmUy6wD69eTa8DPQhdfDlh_98L7seja7jIUQA"/><meta name="yandex-verification" content="5bf6f6598e8639ca"/><meta name="facebook-domain-verification" content="u12hlura60iag5ysnvf6761lhe6chz"/><meta name="description" content="Check out all Auth0 Webinars. We've put together incredible lineup of live meetings with partners and customers exploring the complex world of identity."/><meta property="og:type" content="website"/><meta property="og:title" content="Webinars - Events, Introductions, and Testimonials | Auth0"/><meta property="og:site_name" content="Auth0"/><meta property="og:description" content="Check out all Auth0 Webinars. We've put together incredible lineup of live meetings with partners and customers exploring the complex world of identity."/><meta property="og:locale" content="en"/><meta property="og:url" content="https://auth0.com/de/resources/webinars"/><meta property="og:image" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="og:image:secure_url" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta property="fb:app_id" content="507756515938786"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@auth0"/><meta name="twitter:creator" content="@auth0"/><meta name="twitter:title" content="Webinars - Events, Introductions, and Testimonials | Auth0"/><meta name="twitter:description" content="Check out all Auth0 Webinars. We've put together incredible lineup of live meetings with partners and customers exploring the complex world of identity."/><meta name="twitter:image:src" content="https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png"/><meta name="twitter:image:width" content="1024"/><meta name="twitter:image:height" content="512"/><meta name="theme-color" content="#ffffff"/><meta name="pocket-site-verification" content="d301f9bf5a8414226ceee36fc991e9"/><link rel="canonical" href="https://auth0.com/de/resources/webinars"/><link rel="alternate" hrefLang="en" href="https://auth0.com/resources/webinars"/><link rel="alternate" hrefLang="de" href="https://auth0.com/de/resources/webinars"/><link rel="alternate" hrefLang="fr" href="https://auth0.com/fr/resources/webinars"/><link rel="alternate" hrefLang="ja" href="https://auth0.com/jp/resources/webinars"/><link rel="alternate" hrefLang="es" href="https://auth0.com/es/resources/webinars"/><link rel="alternate" hrefLang="pt" href="https://auth0.com/pt/resources/webinars"/><link rel="alternate" hrefLang="x-default" href="https://auth0.com/resources/webinars"/><script type="application/ld+json">{ "@context": "http://schema.org", "@type": "WebPage", "name": "Webinars - Events, Introductions, and Testimonials | Auth0", "description": "Check out all Auth0 Webinars. We've put together incredible lineup of live meetings with partners and customers exploring the complex world of identity.", "url": "https://auth0.com/de/resources/webinars", "image": "https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png", "publisher": { "@type": "Organization", "name": "Auth0", "legalName": "Auth0 Inc.", "url": "https://auth0.com/", "logo": "https://cdn.auth0.com/website/home-page/evolution_logo_Auth0_black.svg", "foundingDate": "2013-02-01T00:00:00.000Z", "address": { "@type": "PostalAddress", "streetAddress": "10800 NE 8th Street, Suite 600", "addressLocality": "Bellevue", "addressRegion": "WA", "postalCode": "98004", "addressCountry": "USA" }, "contactPoint": { "@type": "ContactPoint", "contactType": "Customer Support", "telephone": "[+888-235-2699]", "email": "info@auth0.com" }, "sameAs": [ "https://twitter.com/auth0", "https://www.facebook.com/getauth0/", "https://www.linkedin.com/company/auth0" ] } }</script><link rel="preload" href="https://auth0.com/contact-us/api/form-data" as="fetch" crossorigin="use-credentials"/><script> const generateNewContext = () => { return { window: { location: { hash: window.location.hash, host: window.location.host, hostname: window.location.hostname, href: window.location.href, origin: window.location.origin, pathname: window.location.pathname, port: window.location.port, protocol: window.location.protocol, search: window.location.search, }, navigator: { language: window.navigator.language, browserLanguage: window.navigator.browserLanguage, userAgent: window.navigator.userAgent, }, innerHeight: window.innerHeight, innerWidth: window.innerWidth, }, document: { title: document.title, referrer: document.referrer, }, }; }; window.addEventListener('resize', () => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftUpdateContext', data: generateNewContext() }, '*', ); }); window.addEventListener('scroll', (event) => { const iframe = document.getElementById('drift-iframe'); iframe.contentWindow.postMessage( { type: 'driftParentScroll', data: { scroll: true }, target: 'drift.parentScroll', }, '*', ); }); window.addEventListener('message', function (event) { const iframe = document.getElementById('drift-iframe'); if ( !(iframe && iframe.contentWindow) && event.source === iframe.contentWindow ) { return; } const message = event.data; if (message.type === 'drift:ready') { iframe.contentWindow.postMessage( { type: 'driftSetContext', data: generateNewContext() }, '*', ); } if (message.type === 'drift:resize') { const styles = message.data.styles; for (let key in styles) { if (!styles.hasOwnProperty(key)) { continue; } iframe.style.setProperty(key, styles[key]); } } }); </script><meta name="next-head-count" content="39"/><link rel="shortcut icon mask-icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/svg+xml" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon.svg"/><link rel="shortcut icon" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="16x16" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-16.png"/><link rel="icon" sizes="32x32" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-32.png"/><link rel="icon" sizes="48x48" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-48.png"/><link rel="icon" sizes="96x96" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-96.png"/><link rel="icon" sizes="144x144" type="image/png" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-144.png"/><link rel="apple-touch-icon" sizes="180x180" href="https://cdn.auth0.com/website/website/favicons/auth0-favicon-180.png"/><link rel="stylesheet" type="text/css" href="https://cdn.auth0.com/website/styleguide/core-custom/1.0.3/core.min.css"/><link rel="stylesheet" type="text/css" charSet="UTF-8" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick.min.css"/><link rel="stylesheet" type="text/css" href="https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick-theme.min.css"/><script type="text/plain" class="optanon-category-4">(function (h, o, t, j, a, r) {h.hj = h.hj || function () { (h.hj.q = h.hj.q || []).push(arguments) }; h._hjSettings = { hjid: 301495, hjsv: 5 }; a = o.getElementsByTagName('head')[0]; r = o.createElement('script'); r.async = 1; r.src = t + h._hjSettings.hjid + j + h._hjSettings.hjsv; a.appendChild(r);}(window, document, '//static.hotjar.com/c/hotjar-', '.js?sv='))</script><script type="text/plain" class="optanon-category-4"> window._6si = window._6si || []; window._6si.push(['enableEventTracking', true]); window._6si.push(['setToken', '5400c5b6d4c7c0376f36ed7c5ebbc828']); window._6si.push(['setEndpoint', 'b.6sc.co']); (function() { var gd = document.createElement('script'); gd.type = 'text/javascript'; gd.async = true; gd.src = '//j.6sc.co/6si.min.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(gd, s); })();</script><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/b2b-enterprise-identity-management/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/webpack-f94b7d1e45d3fc92.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/framework-2fe4cb6473b20297.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/main-0e6c5455930a1b1c.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/pages/_app-e129453826c91d72.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/9236dd9e-7ef2a7c97b873409.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/fec483df-521c76ff9a14386b.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/3339-8a055232aafba6ff.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/1664-df515f0f42a0699e.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/9927-7c42c6c1053de6d9.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/924-10208592250ae0f5.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/6817-25ba8ff6fef84b3c.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/8100-884483109a830fc5.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/3296-19c42866990842c9.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/4563-4c9d6d6ef9ba84e4.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/1344-0c7c5790f9b851a0.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/chunks/pages/%5Blang%5D/resources/%5BresourcesType%5D-9201957691dbc51f.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/Yof3ibkw2yhtaOc5FW4rP/_buildManifest.js" defer=""></script><script src="/b2b-enterprise-identity-management/_next/static/Yof3ibkw2yhtaOc5FW4rP/_ssgManifest.js" defer=""></script><style data-styled="" data-styled-version="5.3.6">html{line-height:1.15;-webkit-text-size-adjust:100%;}/*!sc*/ body{margin:0;}/*!sc*/ main{display:block;}/*!sc*/ h1{font-size:2em;margin:0.67em 0;}/*!sc*/ hr{box-sizing:content-box;height:0;overflow:visible;}/*!sc*/ pre{font-family:monospace,monospace;font-size:1em;}/*!sc*/ a{background-color:transparent;}/*!sc*/ abbr[title]{border-bottom:none;-webkit-text-decoration:underline;text-decoration:underline;-webkit-text-decoration:underline dotted;text-decoration:underline dotted;}/*!sc*/ b,strong{font-weight:bolder;}/*!sc*/ code,kbd,samp{font-family:monospace,monospace;font-size:1em;}/*!sc*/ small{font-size:80%;}/*!sc*/ sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline;}/*!sc*/ sub{bottom:-0.25em;}/*!sc*/ sup{top:-0.5em;}/*!sc*/ img{border-style:none;}/*!sc*/ button,input,optgroup,select,textarea{font-family:inherit;font-size:100%;line-height:1.15;margin:0;}/*!sc*/ button,input{overflow:visible;}/*!sc*/ button,select{text-transform:none;}/*!sc*/ button,[type="button"],[type="reset"],[type="submit"]{-webkit-appearance:button;}/*!sc*/ button::-moz-focus-inner,[type="button"]::-moz-focus-inner,[type="reset"]::-moz-focus-inner,[type="submit"]::-moz-focus-inner{border-style:none;padding:0;}/*!sc*/ button:-moz-focusring,[type="button"]:-moz-focusring,[type="reset"]:-moz-focusring,[type="submit"]:-moz-focusring{outline:1px dotted ButtonText;}/*!sc*/ fieldset{padding:0.35em 0.75em 0.625em;}/*!sc*/ legend{box-sizing:border-box;color:inherit;display:table;max-width:100%;padding:0;white-space:normal;}/*!sc*/ progress{vertical-align:baseline;}/*!sc*/ textarea{overflow:auto;}/*!sc*/ [type="checkbox"],[type="radio"]{box-sizing:border-box;padding:0;}/*!sc*/ [type="number"]::-webkit-inner-spin-button,[type="number"]::-webkit-outer-spin-button{height:auto;}/*!sc*/ [type="search"]{-webkit-appearance:textfield;outline-offset:-2px;}/*!sc*/ [type="search"]::-webkit-search-decoration{-webkit-appearance:none;}/*!sc*/ ::-webkit-file-upload-button{-webkit-appearance:button;font:inherit;}/*!sc*/ details{display:block;}/*!sc*/ summary{display:list-item;}/*!sc*/ template{display:none;}/*!sc*/ [hidden]{display:none;}/*!sc*/ data-styled.g52[id="sc-global-ecVvVt1"]{content:"sc-global-ecVvVt1,"}/*!sc*/ .cJRWJS{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:linear-gradient(81deg,#191919 0%,#383838 100%);border-color:transparent;border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.cJRWJS{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .cJRWJS:active{color:#FFFFFF80;}/*!sc*/ .cJRWJS:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);color:#FFFEFA;background:linear-gradient(79deg,#3F59E4 0%,#4016A0 148.29%);cursor:pointer;}/*!sc*/ .gsHAMX{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:transparent;border-color:#191919;border-radius:0.6rem;border-style:solid;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.gsHAMX{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .gsHAMX:active{color:#FFFFFF80;border-color:#3F59E4;}/*!sc*/ .gsHAMX:hover{-webkit-transition:all 0.25s cubic-bezier(0.4,0,0.2,1);transition:all 0.25s cubic-bezier(0.4,0,0.2,1);border-color:#3F59E4;color:#3F59E4;background:transparent;cursor:pointer;}/*!sc*/ .iBRLYD{margin:0;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-width:0;border-color:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);border-radius:0.6rem;border-style:solid;color:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;font-size:1.6rem;line-height:2.4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;padding:1.2rem 3.2rem;width:100%;height:-webkit-fit-content;height:-moz-fit-content;height:fit-content;-webkit-text-decoration:none;text-decoration:none;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;font-family:Aeonik,sans-serif;font-style:normal;font-weight:500;position:relative;overflow:hidden;}/*!sc*/ @media screen and (min-width:900px){.iBRLYD{width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}}/*!sc*/ .iBRLYD:active{color:rgba(255,254,250,0.8);border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);background:linear-gradient(0deg,rgba(0,0,0,0.20) 0%,rgba(0,0,0,0.20) 100%),radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .iBRLYD:hover{-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;border-color:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);color:#FFFEFA;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);cursor:pointer;-webkit-backdrop-filter:blur(34px);backdrop-filter:blur(34px);}/*!sc*/ .iBRLYD:hover{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .iBRLYD:active{box-shadow:0px 8px 55px 0px rgba(182,202,255,0.24);}/*!sc*/ .iBRLYD span{z-index:3;}/*!sc*/ .iBRLYD:hover{background:radial-gradient(223% 105.53% at 6.05% 199.17%,rgba(255,255,255,0.14) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(31.68% 130.91% at 100% 0%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(43.14% 139.47% at 0% 136.21%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#4016A0 7.99%,#3F59E4 93.36%);}/*!sc*/ .iBRLYD::before{content:'';width:100%;height:100%;display:inline-block;background:radial-gradient(1357.61% 111.93% at 58.53% 60.34%,rgba(255,255,255,0.40) 0%,rgba(180,155,252,0.00) 0.01%,rgba(182,202,255,0.40) 100%),radial-gradient(69% 81.35% at -8.65% 100%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(637.58% 79.63% at 96.25% -14.82%,rgba(255,255,255,0.20) 0%,rgba(255,255,255,0.00) 100%),radial-gradient(1373.34% 61.44% at -8.75% 153.45%,rgba(227,235,255,0.30) 0%,rgba(255,255,255,0.00) 100%),linear-gradient(170deg,#3F59E4 7.99%,#3F59E4 93.36%);opacity:0;position:absolute;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ .iBRLYD:hover::before{opacity:1;}/*!sc*/ data-styled.g53[id="styled__Button-sc-1hwml9q-0"]{content:"cJRWJS,gsHAMX,iBRLYD,"}/*!sc*/ .cGdNT.cGdNT.cGdNT{color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .dCCmSO.dCCmSO.dCCmSO{width:100%;}/*!sc*/ .isBdzo.isBdzo.isBdzo{margin-top:1.6rem;width:100%;}/*!sc*/ .bHQaKS.bHQaKS.bHQaKS{color:#191919;font-weight:500;line-height:1.8rem;margin-bottom:2.1rem;}/*!sc*/ .fwumGB.fwumGB.fwumGB{-webkit-text-decoration:none;text-decoration:none;line-height:2.2rem;}/*!sc*/ .gtyRnh.gtyRnh.gtyRnh{display:block;color:#191919;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .BcxXA.BcxXA.BcxXA{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .dFMMlW.dFMMlW.dFMMlW{font-family:Aeonik,sans-serif;color:#686868;font-size:1.4rem;-webkit-letter-spacing:0.015rem;-moz-letter-spacing:0.015rem;-ms-letter-spacing:0.015rem;letter-spacing:0.015rem;line-height:2rem;}/*!sc*/ .ierwBG.ierwBG.ierwBG{color:#191919;}/*!sc*/ .bHOya.bHOya.bHOya{-webkit-text-decoration:none;text-decoration:none;display:block;}/*!sc*/ .eDrEVh.eDrEVh.eDrEVh{color:#191919;margin:0;}/*!sc*/ .bdeJQk.bdeJQk.bdeJQk{font-family:Aeonik,sans-serif;color:#1E212A;margin:0.4rem 0 0;font-weight:500;font-size:1.6rem;line-height:2rem;}/*!sc*/ .blScNC.blScNC.blScNC{margin-right:1.6rem;-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.4rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.blScNC.blScNC.blScNC{padding:0.65rem 2.4rem;}}/*!sc*/ .kRzliz.kRzliz.kRzliz{-webkit-letter-spacing:0.032rem;-moz-letter-spacing:0.032rem;-ms-letter-spacing:0.032rem;letter-spacing:0.032rem;padding:1.05rem 2.2rem;white-space:nowrap;-webkit-transition:all 0.4s ease-in-out;transition:all 0.4s ease-in-out;}/*!sc*/ @media screen and (min-width:1200px){.kRzliz.kRzliz.kRzliz{padding:0.65rem 2.2rem;}}/*!sc*/ .eHMTIY.eHMTIY.eHMTIY{color:#141414;font-weight:600;line-height:5.4rem;-webkit-letter-spacing:-0.16rem;-moz-letter-spacing:-0.16rem;-ms-letter-spacing:-0.16rem;letter-spacing:-0.16rem;text-align:left;}/*!sc*/ @media screen and (min-width:900px){.eHMTIY.eHMTIY.eHMTIY{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:1200px){.eHMTIY.eHMTIY.eHMTIY{line-height:7.2rem;}}/*!sc*/ @media screen and (min-width:900px){.eHMTIY.eHMTIY.eHMTIY{font-size:6rem;}}/*!sc*/ @media screen and (min-width:1200px){.eHMTIY.eHMTIY.eHMTIY{font-size:6rem;}}/*!sc*/ .dLXTcP.dLXTcP.dLXTcP{font-weight:500;}/*!sc*/ .cHhniM.cHhniM.cHhniM{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-text-decoration:none;text-decoration:none;}/*!sc*/ .hTUVnp.hTUVnp.hTUVnp{color:#80868F;margin:0;}/*!sc*/ .csKyZk.csKyZk.csKyZk{border-top:0.1rem solid #bdc4cf;padding:2.4rem 1.6rem;color:#80868F;margin:0;}/*!sc*/ data-styled.g54[id="utils-sc-11hlfw-0"]{content:"cGdNT,dCCmSO,isBdzo,bHQaKS,fwumGB,gtyRnh,BcxXA,dFMMlW,ierwBG,bHOya,eDrEVh,bdeJQk,blScNC,kRzliz,eHMTIY,dLXTcP,cHhniM,dmQvNV,hTUVnp,csKyZk,"}/*!sc*/ .ieuKTj{margin:0 0 1.6rem 0;color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.ieuKTj{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.ieuKTj{color:#ABABAB;font-family:'Aeonik Mono',monospace;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;line-height:2rem;}}/*!sc*/ .dveEmL{margin:0 0 1.6rem 0;color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.2rem;-webkit-letter-spacing:0.12rem;-moz-letter-spacing:0.12rem;-ms-letter-spacing:0.12rem;letter-spacing:0.12rem;line-height:1.8rem;text-transform:uppercase;padding:0;}/*!sc*/ @media screen and (min-width:900px){.dveEmL{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ @media screen and (min-width:1200px){.dveEmL{color:#8B929B;font-family:SpaceGrotesk,monospace;font-style:NORMAL;font-weight:600;font-size:1.4rem;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;line-height:2rem;}}/*!sc*/ data-styled.g58[id="styled__Overline-sc-165cfko-0"]{content:"ieuKTj,dveEmL,"}/*!sc*/ .fFONwU{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.fFONwU{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.fFONwU{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ .eievug{margin:0 0 1.6rem 0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.eievug{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.eievug{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#41454C;}}/*!sc*/ .gDDDRz{margin:0;color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;padding:0;}/*!sc*/ @media screen and (min-width:900px){.gDDDRz{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ @media screen and (min-width:1200px){.gDDDRz{color:#41454C;font-family:Inter,sans-serif;font-style:NORMAL;font-weight:400;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#41454C;}}/*!sc*/ data-styled.g59[id="styled__Paragraph-sc-165cfko-1"]{content:"fFONwU,eievug,gDDDRz,"}/*!sc*/ .etkYET{margin:0;color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;padding:0;}/*!sc*/ @media screen and (min-width:900px){.etkYET{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:3.2rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;line-height:4rem;color:#1E212A;}}/*!sc*/ @media screen and (min-width:1200px){.etkYET{color:#1E212A;font-family:SpaceGrotesk,sans-serif;font-style:NORMAL;font-weight:600;font-size:4rem;-webkit-letter-spacing:-0.08rem;-moz-letter-spacing:-0.08rem;-ms-letter-spacing:-0.08rem;letter-spacing:-0.08rem;line-height:4.4rem;color:#1E212A;}}/*!sc*/ data-styled.g60[id="styled__Heading-sc-165cfko-2"]{content:"etkYET,"}/*!sc*/ .fOVXAi{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.fOVXAi{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.fOVXAi{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .fOVXAi:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .fOVXAi:active{color:#493FA3;}/*!sc*/ .fOVXAi:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .fOVXAi:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .kVqgZI{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.kVqgZI{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.kVqgZI{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.6rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;line-height:2.4rem;color:#635DFF;}}/*!sc*/ .kVqgZI:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .kVqgZI:active{color:#493FA3;}/*!sc*/ .kVqgZI:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cUdGaW{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.cUdGaW{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.cUdGaW{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .cUdGaW:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .cUdGaW:active{color:#493FA3;}/*!sc*/ .cUdGaW:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .cUdGaW:after{content:'→';padding-left:0.8rem;display:inline-block;}/*!sc*/ .gAIXCo{margin:0;padding:0;font-family:Aeonik,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.gAIXCo{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.gAIXCo{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.8rem;-webkit-letter-spacing:-0.005rem;-moz-letter-spacing:-0.005rem;-ms-letter-spacing:-0.005rem;letter-spacing:-0.005rem;line-height:2.8rem;color:#635DFF;}}/*!sc*/ .gAIXCo:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .gAIXCo:active{color:#493FA3;}/*!sc*/ .gAIXCo:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ .hTVzGn{margin:0;padding:0;font-family:Inter,sans-serif !important;color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;-webkit-text-decoration:none;text-decoration:none;text-underline-offset:0.3rem;cursor:pointer;width:-webkit-fit-content;width:-moz-fit-content;width:fit-content;}/*!sc*/ @media screen and (min-width:900px){.hTVzGn{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ @media screen and (min-width:1200px){.hTVzGn{color:#635DFF;font-family:Inter;font-style:NORMAL;font-weight:500;font-size:1.4rem;-webkit-letter-spacing:0rem;-moz-letter-spacing:0rem;-ms-letter-spacing:0rem;letter-spacing:0rem;line-height:2.2rem;color:#635DFF;}}/*!sc*/ .hTVzGn:hover{color:#564ED1;cursor:pointer;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ .hTVzGn:active{color:#493FA3;}/*!sc*/ .hTVzGn:focus-visible{outline:0.4rem solid #635DFFCC;border-radius:0.4rem;color:#635DFF;}/*!sc*/ data-styled.g62[id="styled__Link-sc-bubr9x-0"]{content:"fOVXAi,kVqgZI,cUdGaW,gAIXCo,hTVzGn,"}/*!sc*/ :root{--content-width:120rem;--font-main:'fakt-web',sans-serif;}/*!sc*/ body{box-sizing:border-box;font-family:var(--font-main);}/*!sc*/ html{font-size:10px;}/*!sc*/ data-styled.g227[id="sc-global-clike1"]{content:"sc-global-clike1,"}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:400;font-display:swap;src:local('Inter-Regular'), url('https://cdn.auth0.com/website/fonts/Inter-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:500;font-display:swap;src:local('Inter-Medium'), url('https://cdn.auth0.com/website/fonts/Inter-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Inter';font-style:normal;font-weight:700;font-display:swap;src:local('Inter-Bold'), url('https://cdn.auth0.com/website/fonts/Inter-Bold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:500;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-Medium'), url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'SpaceGrotesk';font-style:normal;font-weight:600;font-display:swap;font-feature-settings:'zero','ss02' off,'ss03' on,'ss04' on;src:local('SpaceGrotesk-SemiBold'), url('https://cdn.auth0.com/website/fonts/SpaceGrotesk-SemiBold.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'RobotoMono';font-style:normal;font-weight:400;font-display:swap;src:local('RobotoMono-Regular'), url('https://cdn.auth0.com/quantum-fonts/lib/0.0.9/roboto-mono/files/roboto-mono-latin-400-normal.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:400;font-display:swap;src:local('Aeonik-Regular'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik';font-style:normal;font-weight:500;font-display:swap;src:local('Aeonik-Medium'), url('https://cdn.auth0.com/website/cic-homepage/fonts/Aeonik-Medium.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:400;font-display:swap;src:local('AeonikMono-Regular'), url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Regular.woff2') format('woff2');}/*!sc*/ @font-face{font-family:'Aeonik Mono';font-style:normal;font-weight:500;font-display:swap;src:local('AeonikMono-Medium'), url('https://cdn.auth0.com/website/okta-fonts/AeonikMono-Medium.ttf') format('woff2');}/*!sc*/ data-styled.g228[id="sc-global-bZiXeF1"]{content:"sc-global-bZiXeF1,"}/*!sc*/ html{font-size:62.5%;}/*!sc*/ html h1,html h2,html h3,html h4,html h5,html h6{font-feature-settings:'zero';}/*!sc*/ a:focus{outline:-webkit-focus-ring-color auto 0.2rem;outline-offset:0.1rem;}/*!sc*/ data-styled.g229[id="sc-global-ktqmOE1"]{content:"sc-global-ktqmOE1,"}/*!sc*/ .fahHZk{background:#FFFEFA;display:none;position:fixed;z-index:100;top:10.4rem;bottom:0;left:0;right:0;width:100%;overflow:auto;}/*!sc*/ data-styled.g230[id="sc-48604b4d-0"]{content:"fahHZk,"}/*!sc*/ .dYTUtR{margin-bottom:15rem;padding-left:0;}/*!sc*/ data-styled.g231[id="sc-48604b4d-1"]{content:"dYTUtR,"}/*!sc*/ .bBPBdn{list-style:none;width:100%;border-bottom:0.1rem solid #C5C5C5;}/*!sc*/ .bBPBdn:first-of-type{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g232[id="sc-48604b4d-2"]{content:"bBPBdn,"}/*!sc*/ .UJeau{padding:2.4rem 2rem 2.4rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}/*!sc*/ @media screen and (min-width:900px){.UJeau{padding-left:6.4rem;padding-right:6.4rem;}}/*!sc*/ data-styled.g233[id="sc-48604b4d-3"]{content:"UJeau,"}/*!sc*/ .dcBPNJ{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;display:inline-block;width:100%;}/*!sc*/ .dcBPNJ:hover{color:#3F59E4;}/*!sc*/ data-styled.g234[id="sc-48604b4d-4"]{content:"dcBPNJ,"}/*!sc*/ .iqISjd{font-family:Aeonik,sans-serif;font-weight:500;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;color:#191919;margin:0;padding:2.4rem 0 2.4rem 1.6rem;position:relative;-webkit-transition:color 0.2s;transition:color 0.2s;}/*!sc*/ .iqISjd::before{border-style:solid;border-width:0.1em 0.1em 0 0;content:'';display:inline-block;height:1.4rem;right:3rem;top:calc(50% - 0.83rem);position:absolute;vertical-align:top;width:1.4rem;-webkit-transform:rotate(135deg);-ms-transform:rotate(135deg);transform:rotate(135deg);-webkit-transition:-webkit-transform 0.4s ease;-webkit-transition:transform 0.4s ease;transition:transform 0.4s ease;}/*!sc*/ @media screen and (min-width:900px){.iqISjd{padding-left:6.4rem;}.iqISjd:before{right:7rem;}}/*!sc*/ data-styled.g235[id="sc-48604b4d-5"]{content:"iqISjd,"}/*!sc*/ .jqBJbC{overflow:hidden;height:auto;-webkit-transition:max-height 0.3s ease-out;transition:max-height 0.3s ease-out;padding-left:1.6rem;background:#F6F7FA;height:0;max-height:0;}/*!sc*/ @media screen and (min-width:900px){.jqBJbC{padding-left:6.4rem;}}/*!sc*/ data-styled.g236[id="sc-48604b4d-6"]{content:"jqBJbC,"}/*!sc*/ .kzEdNm:not(:last-of-type){margin-bottom:3.2rem;}/*!sc*/ .kzEdNm:last-of-type{padding-bottom:1.6rem;}/*!sc*/ data-styled.g237[id="sc-48604b4d-7"]{content:"kzEdNm,"}/*!sc*/ .iDtUXN{font-family:Aeonik Mono,monospace;font-size:1.4rem;line-height:2rem;font-weight:500;-webkit-letter-spacing:0.14rem;-moz-letter-spacing:0.14rem;-ms-letter-spacing:0.14rem;letter-spacing:0.14rem;text-transform:uppercase;color:#8c929c;margin:0 0 2rem;padding-top:3.2rem;}/*!sc*/ data-styled.g238[id="sc-48604b4d-8"]{content:"iDtUXN,"}/*!sc*/ .dIBWQm{list-style:none;padding:0;margin:0;}/*!sc*/ data-styled.g240[id="sc-48604b4d-10"]{content:"dIBWQm,"}/*!sc*/ .dBWnDJ{font-family:Aeonik,sans-serif;font-size:2rem;line-height:2.8rem;-webkit-letter-spacing:0.01rem;-moz-letter-spacing:0.01rem;-ms-letter-spacing:0.01rem;letter-spacing:0.01rem;margin-bottom:2rem;}/*!sc*/ .dBWnDJ a{color:#42464d;display:inline-block;width:100%;}/*!sc*/ .dBWnDJ a:hover{color:#3F59E4;}/*!sc*/ data-styled.g241[id="sc-48604b4d-11"]{content:"dBWnDJ,"}/*!sc*/ .hMidHS{border:none;color:#191919;background:none;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;}/*!sc*/ data-styled.g242[id="sc-48604b4d-12"]{content:"hMidHS,"}/*!sc*/ .bOieih{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g243[id="sc-48604b4d-13"]{content:"bOieih,"}/*!sc*/ .cSezqg{font-weight:500;font-size:1.6rem;line-height:2.4rem;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#191919;margin:0 0 0 0.8rem;}/*!sc*/ data-styled.g244[id="sc-48604b4d-14"]{content:"cSezqg,"}/*!sc*/ .kJKosn{-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;width:100%;padding:1.6rem;margin:0 auto;border-top:0.1rem solid #C5C5C5;position:fixed;bottom:0;left:0;right:0;text-align:center;background:#FFFEFA;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:900px){.kJKosn{padding:3.2rem 6.4rem;}}/*!sc*/ data-styled.g245[id="sc-48604b4d-15"]{content:"kJKosn,"}/*!sc*/ .hydWjh{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:1.6rem;}/*!sc*/ data-styled.g248[id="sc-48604b4d-18"]{content:"hydWjh,"}/*!sc*/ .itTgje{background:#242424;color:#FFFEFA;width:100%;margin:auto;font-size:1.4rem;line-height:2rem;text-align:left;font-family:Aeonik,sans-serif;border-bottom:0.1rem solid #41454C;border-bottom:0.2rem solid;border-image-slice:1;border-image-source:linear-gradient( 135deg, #4cb7a3 0%, #3f59e4 50%, #4016a0 100% );}/*!sc*/ @media screen and (min-width:900px){.itTgje{text-align:left;}}/*!sc*/ data-styled.g250[id="sc-5beafa8a-0"]{content:"itTgje,"}/*!sc*/ .fXlPNE{width:100%;max-width:144rem;min-height:4rem;margin:auto;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:1rem 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.fXlPNE{padding:1rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.fXlPNE{padding:0 6.4rem;}}/*!sc*/ data-styled.g251[id="sc-5beafa8a-1"]{content:"fXlPNE,"}/*!sc*/ .gnbkUy{-webkit-flex:1;-ms-flex:1;flex:1;padding:0;cursor:pointer;}/*!sc*/ @media screen and (min-width:900px){.gnbkUy{padding:0;}}/*!sc*/ @media screen and (min-width:1200px){.gnbkUy{padding:0.9rem 0;margin-right:2.4rem;}}/*!sc*/ .gnbkUy:hover .sc-5beafa8a-4{color:#B6CAFF;}/*!sc*/ data-styled.g255[id="sc-5beafa8a-5"]{content:"gnbkUy,"}/*!sc*/ .fGOvxz{display:none;}/*!sc*/ @media screen and (min-width:1200px){.fGOvxz{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}}/*!sc*/ data-styled.g256[id="sc-5beafa8a-6"]{content:"fGOvxz,"}/*!sc*/ .gCDOIN{color:#FFFEFA;cursor:pointer;font-weight:500;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .gCDOIN:focus{outline:none;}/*!sc*/ .gCDOIN:hover,.gCDOIN:focus{color:#B6CAFF;}/*!sc*/ data-styled.g257[id="sc-5beafa8a-7"]{content:"gCDOIN,"}/*!sc*/ .bgMNvC{cursor:pointer;color:#FFFEFA;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .bgMNvC svg{stroke:#FFFEFA;}/*!sc*/ .bgMNvC:hover,.bgMNvC:focus-within{color:#B6CAFF;}/*!sc*/ .bgMNvC:hover svg,.bgMNvC:focus-within svg{stroke:#B6CAFF;}/*!sc*/ data-styled.g258[id="sc-5beafa8a-8"]{content:"bgMNvC,"}/*!sc*/ .iDaiez{line-height:2rem;}/*!sc*/ .iDaiez:hover{color:#493FA3;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g259[id="sc-5beafa8a-9"]{content:"iDaiez,"}/*!sc*/ .flgNuK{height:100%;width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g260[id="sc-5beafa8a-10"]{content:"flgNuK,"}/*!sc*/ .jjbnIz{font-weight:500;-webkit-appearance:none;-moz-appearance:none;appearance:none;height:100%;background-color:transparent;border:none;margin:0;font-family:inherit;font-size:inherit;cursor:inherit;line-height:inherit;color:inherit;z-index:1;outline:none;padding-left:2rem;padding-right:1.6rem;text-align:center;width:100%;}/*!sc*/ data-styled.g261[id="sc-5beafa8a-11"]{content:"jjbnIz,"}/*!sc*/ .gUmNqK{left:0;pointer-events:none;position:absolute;top:calc(50% - 1rem);z-index:0;}/*!sc*/ data-styled.g262[id="sc-5beafa8a-12"]{content:"gUmNqK,"}/*!sc*/ .cJXqJO{-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:100%;pointer-events:none;position:absolute;right:0;z-index:0;}/*!sc*/ data-styled.g263[id="sc-5beafa8a-13"]{content:"cJXqJO,"}/*!sc*/ .eiqtQu{height:10.4rem;width:100%;margin:0 auto;}/*!sc*/ @media screen and (min-width:1200px){.eiqtQu{display:none;}}/*!sc*/ data-styled.g265[id="sc-dd041119-1"]{content:"eiqtQu,"}/*!sc*/ .iaTkkA{height:0.1rem;position:absolute;visibility:hidden;top:0;}/*!sc*/ data-styled.g266[id="sc-dd041119-2"]{content:"iaTkkA,"}/*!sc*/ .dAIDFK{position:fixed;top:0;left:0;width:100%;z-index:1000;color:#191919;}/*!sc*/ data-styled.g267[id="sc-dd041119-3"]{content:"dAIDFK,"}/*!sc*/ .hvNmHd{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g268[id="sc-dd041119-4"]{content:"hvNmHd,"}/*!sc*/ .iDvPUZ{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g269[id="sc-dd041119-5"]{content:"iDvPUZ,"}/*!sc*/ .cdYdvX{-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;display:none;width:100%;max-width:100%;margin:auto;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.cdYdvX{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ .cdYdvX:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g270[id="sc-dd041119-6"]{content:"cdYdvX,"}/*!sc*/ .SNAUb{max-width:131.2rem;width:100%;margin:auto;-webkit-transition:background-color 0.2s ease,border-radius 0.2s ease;transition:background-color 0.2s ease,border-radius 0.2s ease;position:relative;padding:0 6.4rem;background-color:#FFFEFA;}/*!sc*/ @media screen and (min-width:1200px){.SNAUb{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;padding:0;}}/*!sc*/ .SNAUb:hover{background-color:#FFFEFA;border-radius:0 0 1.6rem 1.6rem;}/*!sc*/ data-styled.g271[id="sc-dd041119-7"]{content:"SNAUb,"}/*!sc*/ .goqQNV{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g272[id="sc-dd041119-8"]{content:"goqQNV,"}/*!sc*/ .irBpqS{max-width:144rem;width:100%;margin:auto;padding:1.2rem 1.6rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;background-color:#FFFEFA;height:6.4rem;box-shadow:inset 0 -0.1rem 0 #C5C5C5;position:relative;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:900px){.irBpqS{padding:1.6rem 6.4rem;}}/*!sc*/ @media screen and (min-width:1200px){.irBpqS{display:none;}}/*!sc*/ data-styled.g273[id="sc-dd041119-9"]{content:"irBpqS,"}/*!sc*/ .lmuCEj{justify-self:flex-end;padding:2rem 0;}/*!sc*/ data-styled.g274[id="sc-dd041119-10"]{content:"lmuCEj,"}/*!sc*/ .librYF{-webkit-appearance:none;-moz-appearance:none;appearance:none;border:0;background:transparent;height:2.4rem;margin:0;padding:0;position:relative;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;cursor:pointer;-webkit-transition:all 0.5s ease-in-out;transition:all 0.5s ease-in-out;}/*!sc*/ data-styled.g275[id="sc-dd041119-11"]{content:"librYF,"}/*!sc*/ .kMlQXP{width:2.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;margin-top:1.2rem;}/*!sc*/ .kMlQXP::before,.kMlQXP::after{content:'';position:absolute;width:2.2rem;height:0.25rem;background:#191919;-webkit-transition:all 0.2s ease-in-out;transition:all 0.2s ease-in-out;}/*!sc*/ .kMlQXP::before{-webkit-transform:translateY(-0.7rem);-ms-transform:translateY(-0.7rem);transform:translateY(-0.7rem);}/*!sc*/ .kMlQXP::after{-webkit-transform:translateY(0.7rem);-ms-transform:translateY(0.7rem);transform:translateY(0.7rem);}/*!sc*/ data-styled.g276[id="sc-dd041119-12"]{content:"kMlQXP,"}/*!sc*/ .hxYec{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0;list-style:none;margin:0;line-height:2.4rem;}/*!sc*/ data-styled.g277[id="sc-dd041119-13"]{content:"hxYec,"}/*!sc*/ .ZBdFw{color:#191919;cursor:initial;padding-top:0.9rem;width:104.4rem;position:absolute;left:0;right:0;margin:-0.1rem auto 0;top:6.4rem;display:inline-block;visibility:hidden;opacity:0;-webkit-transform:translateX(-1.6rem);-ms-transform:translateX(-1.6rem);transform:translateX(-1.6rem);-webkit-transition:visibility 0s,opacity 0.2s linear,-webkit-transform 0.2s linear;-webkit-transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;transition:visibility 0s,opacity 0.2s linear,transform 0.2s linear;}/*!sc*/ data-styled.g278[id="sc-dd041119-14"]{content:"ZBdFw,"}/*!sc*/ .fIvfJ{position:relative;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;color:#191919;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .fIvfJ::after{content:'';-webkit-transition:border-color 0.2s ease,-webkit-transform 0.2s ease;-webkit-transition:border-color 0.2s ease,transform 0.2s ease;transition:border-color 0.2s ease,transform 0.2s ease;width:100%;height:0.2rem;border-bottom:0.2rem solid transparent;display:block;bottom:-1.6rem;position:absolute;left:0;-webkit-transform:scale(0,1);-ms-transform:scale(0,1);transform:scale(0,1);}/*!sc*/ data-styled.g279[id="sc-dd041119-15"]{content:"fIvfJ,"}/*!sc*/ .iLTAgf{font-family:Aeonik,sans-serif;padding:1.6rem 1.2rem;cursor:pointer;font-size:1.6rem;font-weight:500;line-height:3.2rem;-webkit-letter-spacing:0.02rem;-moz-letter-spacing:0.02rem;-ms-letter-spacing:0.02rem;letter-spacing:0.02rem;}/*!sc*/ .iLTAgf .sc-dd041119-15 > svg{stroke:#191919;-webkit-transition:stroke 0.2s ease;transition:stroke 0.2s ease;padding-left:0.4rem;}/*!sc*/ .iLTAgf:hover{color:#3F59E4;}/*!sc*/ .iLTAgf:hover .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .iLTAgf:hover .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .iLTAgf:hover .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .iLTAgf:hover .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .iLTAgf:focus-visible{color:#3F59E4;}/*!sc*/ .iLTAgf:focus-visible .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .iLTAgf:focus-visible .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .iLTAgf:focus-visible .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .iLTAgf:focus-visible .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ .iLTAgf:focus-within{color:#3F59E4;}/*!sc*/ .iLTAgf:focus-within .sc-dd041119-14{visibility:visible;opacity:1;-webkit-transform:translateX(0);-ms-transform:translateX(0);transform:translateX(0);}/*!sc*/ .iLTAgf:focus-within .sc-dd041119-15{color:#3F59E4;}/*!sc*/ .iLTAgf:focus-within .sc-dd041119-15::after{border-bottom-color:#3F59E4;-webkit-transform:scale(1,1);-ms-transform:scale(1,1);transform:scale(1,1);}/*!sc*/ .iLTAgf:focus-within .sc-dd041119-15 > svg{stroke:#3F59E4;}/*!sc*/ data-styled.g280[id="sc-dd041119-16"]{content:"iLTAgf,"}/*!sc*/ .ecCLmy{background:rgba(255,255,255,0.88);-webkit-backdrop-filter:blur(20px);backdrop-filter:blur(20px);border:0.1rem solid #C5C5C5;border-radius:1rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g281[id="sc-dd041119-17"]{content:"ecCLmy,"}/*!sc*/ .fpHhIS{min-width:31.1rem;width:31.1rem;padding:3.2rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ data-styled.g286[id="sc-8f844919-0"]{content:"fpHhIS,"}/*!sc*/ .vgaOL{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .elvwLW{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g287[id="sc-8f844919-1"]{content:"vgaOL,elvwLW,"}/*!sc*/ .juzMWM{border-right:0.1rem solid #C5C5C5;-webkit-flex:1;-ms-flex:1;flex:1;width:100%;min-width:33%;}/*!sc*/ .hkOlGh{border-right:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g288[id="sc-8f844919-2"]{content:"juzMWM,hkOlGh,"}/*!sc*/ .cmuXnw{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem;width:100%;min-width:33%;}/*!sc*/ .edUBug{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:3.2rem 0;}/*!sc*/ .ftjeVJ{width:auto;-webkit-flex:1;-ms-flex:1;flex:1;padding:0;width:100%;min-width:33%;}/*!sc*/ data-styled.g289[id="sc-8f844919-3"]{content:"cmuXnw,edUBug,ftjeVJ,"}/*!sc*/ .kPRjAI{list-style:none;padding:0;height:100%;}/*!sc*/ data-styled.g291[id="sc-c4163730-1"]{content:"kPRjAI,"}/*!sc*/ .jfwYlN{margin:0;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-family:Aeonik,sans-serif;font-weight:500;font-size:1.4rem;line-height:2.4rem;color:#1E212A;}/*!sc*/ .jfwYlN + li{margin-top:1.6rem;}/*!sc*/ .jfwYlN svg{margin-right:1.4rem;min-width:2.4rem;}/*!sc*/ .jfwYlN a{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;width:100%;}/*!sc*/ .jfwYlN a:hover{color:#3F59E4;}/*!sc*/ .jfwYlN:last-of-type{margin-bottom:3.2rem;}/*!sc*/ data-styled.g292[id="sc-c4163730-2"]{content:"jfwYlN,"}/*!sc*/ .eXTZJw{border-top:0.1rem solid #C5C5C5;padding-top:2.4rem;}/*!sc*/ data-styled.g294[id="sc-c4163730-4"]{content:"eXTZJw,"}/*!sc*/ .eqdKOL{list-style:none;padding:0;display:grid;grid-template-columns:1fr;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;height:100%;}/*!sc*/ data-styled.g295[id="sc-31a2510-0"]{content:"eqdKOL,"}/*!sc*/ .AyFjn{margin:0;padding:3.2rem;height:14.47rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .AyFjn + li{border-top:0.1rem solid #C5C5C5;}/*!sc*/ .AyFjn div{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;}/*!sc*/ .AyFjn a{color:#5a5f66;width:100%;}/*!sc*/ .AyFjn a svg{margin-right:1.4rem;}/*!sc*/ .AyFjn a p{margin:0;}/*!sc*/ .AyFjn a p:first-child{font-weight:500;color:#1E212A;-webkit-transition:color 0.2s ease;transition:color 0.2s ease;}/*!sc*/ .AyFjn a:hover p{color:#5a5f66;}/*!sc*/ .AyFjn a:hover p:first-child{color:#3F59E4;}/*!sc*/ data-styled.g296[id="sc-31a2510-1"]{content:"AyFjn,"}/*!sc*/ .kqrdVl a{display:block;color:#1E212A;}/*!sc*/ .kqrdVl a:hover{color:#3F59E4;}/*!sc*/ .kqrdVl a span{font-weight:500;}/*!sc*/ .kqrdVl a + a{margin-top:2.4rem;}/*!sc*/ .kqrdVl a + p{margin-top:3.6rem;}/*!sc*/ data-styled.g297[id="sc-8583e179-0"]{content:"kqrdVl,"}/*!sc*/ .dqITBV{display:inline-block;position:relative;width:6rem;height:6rem;}/*!sc*/ data-styled.g298[id="sc-8eff408f-0"]{content:"dqITBV,"}/*!sc*/ .fezdDx{width:100%;height:100%;box-sizing:border-box;position:absolute;border-radius:50%;-webkit-animation:loader 0.75s linear infinite;animation:loader 0.75s linear infinite;border:0.2rem solid rgba(0,0,0,0.08);border-left-color:rgba(0,0,0,0.4);}/*!sc*/ @-webkit-keyframes loader{0%{-webkit-transform:rotate(0deg);-ms-transform:rotate(0deg);transform:rotate(0deg);}100%{-webkit-transform:rotate(360deg);-ms-transform:rotate(360deg);transform:rotate(360deg);}}/*!sc*/ @keyframes loader{0%{-webkit-transform:rotate(0deg);-ms-transform:rotate(0deg);transform:rotate(0deg);}100%{-webkit-transform:rotate(360deg);-ms-transform:rotate(360deg);transform:rotate(360deg);}}/*!sc*/ data-styled.g299[id="sc-8eff408f-1"]{content:"fezdDx,"}/*!sc*/ .bgvTYt{margin:1.8rem;opacity:0.5;}/*!sc*/ data-styled.g300[id="sc-8eff408f-2"]{content:"bgvTYt,"}/*!sc*/ .ihoJjn{padding:0 3.2rem;display:block;}/*!sc*/ .ihoJjn:hover p:last-of-type{color:#3F59E4;}/*!sc*/ .ihoJjn:first-child{margin-bottom:2.4rem;}/*!sc*/ data-styled.g301[id="sc-1e1df8de-0"]{content:"ihoJjn,"}/*!sc*/ .jDuOPS{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ data-styled.g302[id="sc-1e1df8de-1"]{content:"jDuOPS,"}/*!sc*/ .eyReJT{height:12rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;width:100%;}/*!sc*/ data-styled.g303[id="sc-1e1df8de-2"]{content:"eyReJT,"}/*!sc*/ .iiLmVo{border-radius:0.8rem;width:100%;max-width:13rem;height:9rem;margin-right:1.9rem;object-fit:cover;}/*!sc*/ data-styled.g304[id="sc-1e1df8de-3"]{content:"iiLmVo,"}/*!sc*/ .fBHclw{border-top:0.1rem solid #C5C5C5;}/*!sc*/ data-styled.g305[id="sc-4b4277c0-0"]{content:"fBHclw,"}/*!sc*/ .cRKzFM{padding:3.2rem 3.2rem 0 3.2rem;}/*!sc*/ data-styled.g306[id="sc-4b4277c0-1"]{content:"cRKzFM,"}/*!sc*/ .fvscCL{background:#fff;padding-top:1.2rem;}/*!sc*/ data-styled.g307[id="sc-da5983f0-0"]{content:"fvscCL,"}/*!sc*/ .ezfOZF{width:100%;max-width:144rem;margin:auto;font-family:Inter,sans-serif;padding:0 1.6rem;}/*!sc*/ @media screen and (min-width:900px){.ezfOZF{padding:0 6.4rem;}}/*!sc*/ data-styled.g308[id="sc-da5983f0-1"]{content:"ezfOZF,"}/*!sc*/ .fKRHFw{display:grid;grid-template-columns:1fr 1fr;grid-row-gap:4.8rem;margin:4.8rem auto auto;}/*!sc*/ @media screen and (min-width:900px){.fKRHFw{margin:6.4rem auto auto;}}/*!sc*/ @media screen and (min-width:1200px){.fKRHFw{grid-template-columns:1fr 1fr 1fr 1fr;grid-template-rows:1fr 1fr;margin:8rem auto auto;max-width:131.2rem;}}/*!sc*/ data-styled.g309[id="sc-da5983f0-2"]{content:"fKRHFw,"}/*!sc*/ .ZAOkc{list-style:none;margin-bottom:0;padding-left:0;}/*!sc*/ data-styled.g310[id="sc-da5983f0-3"]{content:"ZAOkc,"}/*!sc*/ .cXUMOl{font-weight:500;font-size:1.4rem;line-height:3.2rem;-webkit-letter-spacing:-0.001rem;-moz-letter-spacing:-0.001rem;-ms-letter-spacing:-0.001rem;letter-spacing:-0.001rem;padding-right:3.2rem;}/*!sc*/ .cXUMOl a{color:#1e212a;}/*!sc*/ .cXUMOl a span{background:linear-gradient( 59deg, #4016a0 -18.49%, #3f59e4 38.74%, #4cb7a3 106.36% );padding:0.1rem 0.6rem;border-radius:0.4rem;margin-left:0.8rem;color:#fff;font-weight:600;}/*!sc*/ .cXUMOl a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.cXUMOl p::before{content:'';margin-right:0.8rem;border-left:0.1rem solid #8c929c;height:1.2rem;display:inline-block;}}/*!sc*/ data-styled.g312[id="sc-da5983f0-5"]{content:"cXUMOl,"}/*!sc*/ .dsTXTr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ .dsTXTr > ul{-webkit-flex:1;-ms-flex:1;flex:1;}/*!sc*/ data-styled.g313[id="sc-da5983f0-6"]{content:"dsTXTr,"}/*!sc*/ .bkTsFr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;display:none;}/*!sc*/ @media screen and (min-width:900px){.bkTsFr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin-left:0;}}/*!sc*/ .gtvNxS{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;grid-gap:1.6rem;margin-left:1.6rem;}/*!sc*/ @media screen and (min-width:900px){.gtvNxS{display:none;}}/*!sc*/ data-styled.g314[id="sc-da5983f0-7"]{content:"bkTsFr,gtvNxS,"}/*!sc*/ .kuTTBJ{height:2.4rem;}/*!sc*/ .kuTTBJ:hover{cursor:pointer;}/*!sc*/ .kuTTBJ:hover path{fill:#635dff;}/*!sc*/ data-styled.g315[id="sc-da5983f0-8"]{content:"kuTTBJ,"}/*!sc*/ .dFYjGw{padding:2.4rem 0 0;position:relative;margin-top:4.8rem;}/*!sc*/ @media screen and (min-width:900px){.dFYjGw{display:none;}}/*!sc*/ data-styled.g316[id="sc-da5983f0-9"]{content:"dFYjGw,"}/*!sc*/ .dceiQn{display:none;}/*!sc*/ @media screen and (min-width:900px){.dceiQn{display:block;border-top:0.1rem solid #bdc4cf;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;padding:2.4rem 0;position:relative;margin-top:4.8rem;}}/*!sc*/ @media screen and (min-width:1200px){.dceiQn{margin-top:10rem;}}/*!sc*/ data-styled.g317[id="sc-da5983f0-10"]{content:"dceiQn,"}/*!sc*/ .bfQQBn{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;margin:2.4rem 1.6rem;}/*!sc*/ data-styled.g318[id="sc-da5983f0-11"]{content:"bfQQBn,"}/*!sc*/ .fMOddY{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;font-weight:500;color:#8c929c;grid-gap:0.6rem;font-size:1.2rem;line-height:1.8rem;-webkit-flex:1;-ms-flex:1;flex:1;-webkit-flex-flow:wrap;-ms-flex-flow:wrap;flex-flow:wrap;}/*!sc*/ .fMOddY img{max-width:4rem;}/*!sc*/ .fMOddY a{color:#8c929c;}/*!sc*/ .fMOddY a:hover{color:#635dff;}/*!sc*/ @media screen and (min-width:900px){.fMOddY{-webkit-box-pack:end;-webkit-justify-content:flex-end;-ms-flex-pack:end;justify-content:flex-end;}}/*!sc*/ @media screen and (min-width:1200px){.fMOddY{font-size:1.4rem;line-height:2.2rem;}}/*!sc*/ data-styled.g319[id="sc-da5983f0-12"]{content:"fMOddY,"}/*!sc*/ .kwdIoB{cursor:pointer;height:100%;color:#1e212a;margin-left:3.2rem;position:relative;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ .kwdIoB svg{stroke:#1e212a;}/*!sc*/ .kwdIoB:hover{color:#635dff;}/*!sc*/ .kwdIoB:hover svg{stroke:#635dff;}/*!sc*/ data-styled.g320[id="sc-da5983f0-13"]{content:"kwdIoB,"}/*!sc*/ .doMXBO{visibility:hidden;opacity:0;position:absolute;-webkit-transition:opacity 0.2s ease;transition:opacity 0.2s ease;left:-3.4rem;top:-20.2rem;display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.doMXBO{left:-2.4rem;}}/*!sc*/ data-styled.g321[id="sc-da5983f0-14"]{content:"doMXBO,"}/*!sc*/ .eZHkDb{min-width:13.4rem;margin-top:0;background:#fff;color:#635dff;box-shadow:0 0 0.8rem rgba(0,0,0,0.25);border-radius:0.8rem;padding:1.6rem 2.4rem;list-style:none;}/*!sc*/ data-styled.g322[id="sc-da5983f0-15"]{content:"eZHkDb,"}/*!sc*/ .hYxKnm{line-height:2.8rem;}/*!sc*/ .hYxKnm:hover{color:#635dff;-webkit-text-decoration:underline;text-decoration:underline;}/*!sc*/ data-styled.g323[id="sc-da5983f0-16"]{content:"hYxKnm,"}/*!sc*/ .fWXPij{display:-webkit-inline-box;display:-webkit-inline-flex;display:-ms-inline-flexbox;display:inline-flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;z-index:1;font-size:1.2rem;}/*!sc*/ @media screen and (min-width:1200px){.fWXPij{font-size:1.4rem;}}/*!sc*/ .fWXPij:hover .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fWXPij:focus-visible .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ .fWXPij:focus-within .sc-da5983f0-14{visibility:visible;opacity:1;}/*!sc*/ data-styled.g324[id="sc-da5983f0-17"]{content:"fWXPij,"}/*!sc*/ .iBuHa-D{margin-left:0.8rem;font-weight:500;}/*!sc*/ data-styled.g325[id="sc-da5983f0-18"]{content:"iBuHa-D,"}/*!sc*/ .hdUzyc{padding:4rem 0;display:block;text-align:center;background-color:#f1f3f7;}/*!sc*/ @media screen and (min-width:900px){.hdUzyc{text-align:left;padding:6rem 0;}}/*!sc*/ @media screen and (min-width:1200px){.hdUzyc{padding:8rem 2rem;}}/*!sc*/ data-styled.g329[id="sc-3e4086c7-0"]{content:"hdUzyc,"}/*!sc*/ .fEObSb{width:100%;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;padding:0 2rem;margin:0 auto;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;}/*!sc*/ @media screen and (min-width:1200px){.fEObSb{max-width:121.6rem;padding:0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:3.2rem;}}/*!sc*/ data-styled.g330[id="sc-3e4086c7-1"]{content:"fEObSb,"}/*!sc*/ .eBkOFK{color:#1e212a;font-family:SpaceGrotesk,sans-serif;font-size:2.8rem;line-height:3.6rem;-webkit-letter-spacing:-0.0375rem;-moz-letter-spacing:-0.0375rem;-ms-letter-spacing:-0.0375rem;letter-spacing:-0.0375rem;font-weight:600;padding:0;margin:0 auto 3.2rem;display:block;text-align:center;}/*!sc*/ .eBkOFK p{margin:0;}/*!sc*/ @media screen and (min-width:900px){.eBkOFK{font-size:3.2rem;line-height:4rem;-webkit-letter-spacing:-0.05rem;-moz-letter-spacing:-0.05rem;-ms-letter-spacing:-0.05rem;letter-spacing:-0.05rem;}}/*!sc*/ @media screen and (min-width:1200px){.eBkOFK{margin:0;max-width:100%;font-size:4.2rem;line-height:5.2rem;-webkit-letter-spacing:-0.1rem;-moz-letter-spacing:-0.1rem;-ms-letter-spacing:-0.1rem;letter-spacing:-0.1rem;text-align:left;}}/*!sc*/ data-styled.g331[id="sc-3e4086c7-2"]{content:"eBkOFK,"}/*!sc*/ .ggNbtU{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;width:100%;}/*!sc*/ @media screen and (min-width:1200px){.ggNbtU{-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;width:auto;}}/*!sc*/ data-styled.g332[id="sc-3e4086c7-3"]{content:"ggNbtU,"}/*!sc*/ .hwtIDu{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:#635DFF;}/*!sc*/ .hwtIDu:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ .hwtIDu:hover{color:#ffffff;background-color:#564ed1;}/*!sc*/ @media screen and (min-width:1200px){.hwtIDu{margin:0 0 0 3.2rem;font-size:1.4rem;}.hwtIDu:not(:last-child){margin:0;}}/*!sc*/ .cNWeht{font-size:1.3rem;font-weight:700;line-height:1.33;-webkit-letter-spacing:0.1rem;-moz-letter-spacing:0.1rem;-ms-letter-spacing:0.1rem;letter-spacing:0.1rem;text-transform:uppercase;padding:2.2rem 3.2rem;border-width:0;border-style:solid;border-radius:0.4rem;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;color:#ffffff;overflow:hidden;white-space:nowrap;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;touch-action:manipulation;background-color:transparent;color:#1E212A;border:0.15rem solid #606060;}/*!sc*/ .cNWeht:not(:last-child){margin:0 0 2.4rem;}/*!sc*/ @media screen and (min-width:1200px){.cNWeht{margin:0 0 0 3.2rem;font-size:1.4rem;}.cNWeht:not(:last-child){margin:0;}}/*!sc*/ data-styled.g333[id="sc-3e4086c7-4"]{content:"hwtIDu,cNWeht,"}/*!sc*/ .goMtfQ{text-align:center;max-width:121.6rem;margin:0 auto 12rem;padding-top:0;}/*!sc*/ @media screen and (min-width:1200px){.goMtfQ{padding-top:10.7rem;}}/*!sc*/ data-styled.g337[id="sc-527f19d-0"]{content:"goMtfQ,"}/*!sc*/ .lhJrRr{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;margin:4rem 2rem;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;gap:4rem;}/*!sc*/ @media screen and (min-width:900px){.lhJrRr{margin:8rem 2rem;}}/*!sc*/ @media screen and (min-width:1200px){.lhJrRr{margin:8rem 0;-webkit-flex-direction:row;-ms-flex-direction:row;flex-direction:row;gap:0;}}/*!sc*/ data-styled.g338[id="sc-527f19d-1"]{content:"lhJrRr,"}/*!sc*/ .fpOVHv{display:grid;grid-template-columns:repeat(auto-fill,28rem);grid-column-gap:3.2rem;grid-row-gap:4rem;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 4rem;}/*!sc*/ @media screen and (min-width:900px){.fpOVHv{grid-row-gap:6.4rem;margin:0 0 6rem;}}/*!sc*/ data-styled.g340[id="sc-527f19d-3"]{content:"fpOVHv,"}/*!sc*/ .bSdvZL{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;margin:0 2rem 6.4rem;-webkit-flex-direction:column-reverse;-ms-flex-direction:column-reverse;flex-direction:column-reverse;row-gap:4.2rem;}/*!sc*/ @media screen and (min-width:900px){.bSdvZL{-webkit-align-items:baseline;-webkit-box-align:baseline;-ms-flex-align:baseline;align-items:baseline;-webkit-box-pack:justify;-webkit-justify-content:space-between;-ms-flex-pack:justify;justify-content:space-between;}}/*!sc*/ @media screen and (min-width:1200px){.bSdvZL{margin:0 0 6rem;border-bottom:0.5px solid #BDC4CF;margin:0 0 6.4rem;}}/*!sc*/ data-styled.g341[id="sc-527f19d-4"]{content:"bSdvZL,"}/*!sc*/ .fcFyPA{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;gap:3.4rem;}/*!sc*/ data-styled.g342[id="sc-527f19d-5"]{content:"fcFyPA,"}/*!sc*/ .OrXVW{max-width:28rem;text-align:left;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;position:relative;}/*!sc*/ data-styled.g343[id="sc-527f19d-6"]{content:"OrXVW,"}/*!sc*/ .eEWXUq{width:2.4rem;position:absolute;left:1.5rem;}/*!sc*/ data-styled.g344[id="sc-527f19d-7"]{content:"eEWXUq,"}/*!sc*/ .cHZRhB{border:0.1rem solid #8c929c;border-radius:0.8rem;width:100%;font-weight:400;font-size:1.4rem;line-height:2.4rem;font-family:Inter,sans-serif;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;height:4rem;padding:0.8rem 0 0.8rem 5rem;}/*!sc*/ .cHZRhB::-webkit-input-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB::-moz-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB:-ms-input-placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB::placeholder{color:#5a5f66;}/*!sc*/ .cHZRhB:focus{outline:none !important;border:0.2rem solid #93c7dd;}/*!sc*/ @media screen and (min-width:900px){.cHZRhB{padding:0.8rem 0 0.8rem 5rem;}}/*!sc*/ data-styled.g345[id="sc-527f19d-8"]{content:"cHZRhB,"}/*!sc*/ .fGcUkc{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;}/*!sc*/ data-styled.g346[id="sc-527f19d-9"]{content:"fGcUkc,"}/*!sc*/ .jgLKGs{background:url(https://cdn.auth0.com/website/resources/select-arrow.svg) 1.4rem no-repeat;background-position:100%;border:none;-webkit-letter-spacing:0.0125rem;-moz-letter-spacing:0.0125rem;-ms-letter-spacing:0.0125rem;letter-spacing:0.0125rem;color:#42464d;padding:0 2.4rem 0 1rem;position:relative;margin:0;text-transform:capitalize;font-size:1.4rem;line-height:2.2rem;font-weight:500;font-family:Inter,sans-serif;cursor:pointer;-webkit-appearance:none;-moz-appearance:none;appearance:none;outline:none;}/*!sc*/ data-styled.g347[id="sc-527f19d-10"]{content:"jgLKGs,"}/*!sc*/ .bIlYES{max-width:15rem;border-radius:0.3rem;-webkit-transition:all 0.6s ease;transition:all 0.6s ease;will-change:transform;}/*!sc*/ data-styled.g348[id="sc-527f19d-11"]{content:"bIlYES,"}/*!sc*/ .gmktfe{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column;text-align:left;-webkit-transition:all 0.2s ease;transition:all 0.2s ease;will-change:transform;cursor:pointer;}/*!sc*/ .gmktfe:hover{-webkit-transform:scale(1.02);-ms-transform:scale(1.02);transform:scale(1.02);}/*!sc*/ .gmktfe:hover .sc-527f19d-11{-webkit-transform:scale(1.1);-ms-transform:scale(1.1);transform:scale(1.1);}/*!sc*/ data-styled.g349[id="sc-527f19d-12"]{content:"gmktfe,"}/*!sc*/ .laBlzA{height:18.6rem;overflow:hidden;background:linear-gradient(0deg,#bdc4cf,#dadfe8);border-radius:0.8rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:center;-webkit-justify-content:center;-ms-flex-pack:center;justify-content:center;-webkit-align-items:flex-start;-webkit-box-align:flex-start;-ms-flex-align:flex-start;align-items:flex-start;padding-top:2rem;}/*!sc*/ data-styled.g350[id="sc-527f19d-13"]{content:"laBlzA,"}/*!sc*/ .kkgLIr{font-size:2rem;line-height:3.2rem;font-weight:500;font-family:Inter,sans-serif;-webkit-letter-spacing:-0.01rem;-moz-letter-spacing:-0.01rem;-ms-letter-spacing:-0.01rem;letter-spacing:-0.01rem;color:#333333;margin:0;}/*!sc*/ data-styled.g351[id="sc-527f19d-14"]{content:"kkgLIr,"}/*!sc*/ .lfPVOF{font-size:1.3rem;line-height:2.3rem;font-family:SpaceGrotesk,sans-serif;font-feature-settings:'pnum' on,'lnum' on,'ordn' on,'ss03' on,'ss04' on, 'kern' off;-webkit-letter-spacing:0.15rem;-moz-letter-spacing:0.15rem;-ms-letter-spacing:0.15rem;letter-spacing:0.15rem;text-transform:uppercase;color:#727272;margin:1rem 0 0.8rem 0;}/*!sc*/ @media screen and (min-width:900px){.lfPVOF{margin:2rem 0 0.8rem 0;}}/*!sc*/ data-styled.g352[id="sc-527f19d-15"]{content:"lfPVOF,"}/*!sc*/ .fIEFZB{list-style:none;line-height:unset;padding:0;margin:0 0 2.4rem;display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;gap:3.3rem;border-bottom:0.05rem solid #bdc4cf;overflow-x:scroll;-webkit-align-items:center;-webkit-box-align:center;-ms-flex-align:center;align-items:center;}/*!sc*/ @media screen and (min-width:1200px){.fIEFZB{margin:0;border-bottom:none;overflow-x:unset;}}/*!sc*/ data-styled.g354[id="sc-527f19d-17"]{content:"fIEFZB,"}/*!sc*/ .fkPsWQ{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:none;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .fkPsWQ a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.fkPsWQ{padding-bottom:2.4rem;}}/*!sc*/ .iEGZFq{text-transform:capitalize;font-size:1.6rem;font-family:Inter,sans-serif;border-bottom:0.2rem solid #1E212A;padding-bottom:1.6rem;white-space:nowrap;}/*!sc*/ .iEGZFq a{color:#1e212a;font-weight:500;}/*!sc*/ @media screen and (min-width:1200px){.iEGZFq{padding-bottom:2.4rem;}}/*!sc*/ data-styled.g355[id="sc-527f19d-18"]{content:"fkPsWQ,iEGZFq,"}/*!sc*/ </style></head><body><div id="__next"><div class="sc-dd041119-2 iaTkkA"></div><div class="sc-dd041119-1 eiqtQu"></div><header class="sc-dd041119-3 dAIDFK"><div class="sc-5beafa8a-0 itTgje"><div class="sc-5beafa8a-1 fXlPNE"><a class="sc-5beafa8a-5 gnbkUy"></a><div class="sc-5beafa8a-6 fGOvxz"><a href="/api/auth/login?redirectTo=dashboard" rel="external" class="sc-5beafa8a-7 gCDOIN">Anmelden</a><div class="sc-5beafa8a-8 bgMNvC"><div class="sc-5beafa8a-10 flgNuK"><span class="sc-5beafa8a-12 gUmNqK"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg></span><select aria-label="Language selector" class="sc-5beafa8a-11 jjbnIz"><option value="de" class="sc-5beafa8a-9 iDaiez" selected="">Deutsch</option><option value="en" class="sc-5beafa8a-9 iDaiez">English</option><option value="fr" class="sc-5beafa8a-9 iDaiez">Français</option><option value="es" class="sc-5beafa8a-9 iDaiez">Español</option><option value="pt" class="sc-5beafa8a-9 iDaiez">Português</option><option value="ja" class="sc-5beafa8a-9 iDaiez">日本語</option></select><span class="sc-5beafa8a-13 cJXqJO"><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></span></div></div></div></div></div><nav aria-label="Mobile nav" class="sc-dd041119-9 irBpqS"><a rel="external" href="/de/" aria-label="Auth0 logo" class="sc-dd041119-5 iDvPUZ"><svg xmlns="http://www.w3.org/2000/svg" width="152" height="40" viewBox="0 0 152 40" fill="none"><g clip-path="url(#clip0_13131_4833)"><path d="M34.7188 26.5791L39.6939 13.5352H41.6133L46.5698 26.5791H44.8367L43.4578 23.0571H37.7748L36.3959 26.5791H34.7188ZM38.2593 21.585H42.9739L40.6073 15.3054L38.2593 21.585Z" fill="#191919"></path><path d="M53.7713 17.0793H55.2993V26.5827H53.9763L53.7713 25.3155C53.2123 26.0237 52.2992 26.6945 50.7338 26.6945C48.6468 26.6945 46.9883 25.5208 46.9883 22.3716V17.0793H48.5163V22.2784C48.5163 24.2534 49.4108 25.2972 50.9947 25.2972C52.7278 25.2972 53.7713 23.9742 53.7713 21.8312V17.0793Z" fill="#191919"></path><path d="M57.7453 18.4754H56.0312V17.0778H57.7453V14.4131H59.2734V17.0778H61.7331V18.4754H59.2734V24.0845C59.2734 24.8854 59.5529 25.1839 60.3728 25.1839H61.8822V26.5815H60.2237C58.3975 26.5815 57.7453 25.7802 57.7453 24.1031V18.4754Z" fill="#191919"></path><path d="M71.2348 21.2868V26.5791H69.7067V21.38C69.7067 19.4051 68.7564 18.3612 67.1165 18.3612C65.3462 18.3612 64.2468 19.6839 64.2468 21.8269V26.5788H62.7188V13.5352H64.2468V18.641C64.8058 17.7466 65.7748 16.9636 67.3774 16.9636C69.5018 16.9636 71.2348 18.1376 71.2348 21.2868Z" fill="#191919"></path><path d="M72.6543 19.7613C72.6543 16.053 74.6668 13.4255 77.6108 13.4255C80.5364 13.4255 82.549 16.053 82.549 19.7613V20.3576C82.549 24.2519 80.5364 26.6931 77.6108 26.6931C74.6668 26.6931 72.6543 24.2519 72.6543 20.3576V19.7613ZM80.965 19.8172C80.965 16.7239 79.6233 14.8604 77.6108 14.8604C75.5799 14.8604 74.2382 16.7239 74.2382 19.8172V20.3017C74.2382 23.3951 75.5799 25.2585 77.6108 25.2585C79.6237 25.2585 80.965 23.3951 80.965 20.3017V19.8172Z" fill="#191919"></path><path d="M98.0691 21.8272C98.0691 24.7343 96.1311 26.6909 93.5036 26.6909C91.901 26.6909 90.8202 26.039 90.2429 25.1259L90.0376 26.5791H88.7148V13.5352H90.2429V18.6035C90.8765 17.7273 91.901 16.9636 93.5036 16.9636C96.1308 16.9636 98.0691 18.7342 98.0691 21.8272ZM96.5035 21.8272C96.5035 19.7588 95.2363 18.3243 93.3542 18.3243C91.4908 18.3243 90.2236 19.7591 90.2236 21.7903C90.2236 23.8771 91.4908 25.3309 93.3542 25.3309C95.2363 25.3306 96.5035 23.8957 96.5035 21.8272Z" fill="#191919"></path><path d="M98.0117 17.0752H99.6329L102.559 24.6592L105.391 17.0752H107.012L102.633 28.1811C102.037 29.7092 101.682 30.3051 100.341 30.3051H98.5145V28.9075H99.8745C100.751 28.9075 100.899 28.6839 101.254 27.7895L101.719 26.6341L98.0117 17.0752Z" fill="#191919"></path><path d="M118.431 26.6928C114.76 26.6928 112.207 23.8979 112.207 20.0591C112.207 16.2207 114.76 13.4255 118.431 13.4255C122.102 13.4255 124.655 16.2207 124.655 20.0591C124.655 23.8976 122.102 26.6928 118.431 26.6928ZM118.431 25.202C121.151 25.202 122.996 23.059 122.996 20.0588C122.996 17.0587 121.151 14.9157 118.431 14.9157C115.71 14.9157 113.865 17.0587 113.865 20.0588C113.865 23.059 115.71 25.202 118.431 25.202Z" fill="#191919"></path><path d="M126.182 13.5352H127.71V22.1254L132.48 17.0754H134.362L130.654 21.007L134.623 26.5788H132.778L129.629 22.1065L127.71 24.0817V26.5784H126.182V13.5352H126.182Z" fill="#191919"></path><path d="M136.464 18.4754H134.75V17.0778H136.464V14.4131H137.992V17.0778H140.452V18.4754H137.992V24.0845C137.992 24.8854 138.272 25.1839 139.092 25.1839H140.601V26.5815H138.942C137.116 26.5815 136.464 25.7802 136.464 24.1031V18.4754Z" fill="#191919"></path><path d="M150.414 25.1837V26.5813H149.576C148.309 26.5813 147.88 26.0409 147.861 25.1092C147.265 25.9664 146.315 26.6931 144.675 26.6931C142.588 26.6931 141.172 25.6496 141.172 23.9165C141.172 22.0158 142.495 20.9536 144.992 20.9536H147.787V20.3014C147.787 19.0719 146.911 18.3265 145.421 18.3265C144.079 18.3265 143.184 18.96 142.998 19.929H141.47C141.694 18.0653 143.203 16.9658 145.495 16.9658C147.918 16.9658 149.315 18.1774 149.315 20.3946V24.5501C149.315 25.0533 149.502 25.184 149.93 25.184L150.414 25.1837ZM147.787 22.2394H144.843C143.483 22.2394 142.719 22.7426 142.719 23.8234C142.719 24.7551 143.52 25.3887 144.787 25.3887C146.688 25.3887 147.788 24.2892 147.788 22.7053V22.2394H147.787Z" fill="#191919"></path><path d="M1.68997 17.8918C6.93659 17.0276 11.0459 12.6902 11.9101 7.44679L12.1993 4.92469C12.27 4.52308 12.0001 3.96725 11.4924 4.00581C7.52776 4.31424 3.79119 5.62188 1.70604 6.47329C0.674703 6.89418 0 7.89981 0 9.01467V17.2396C0 17.728 0.43695 18.0975 0.918881 18.0203L1.68997 17.895V17.8918Z" fill="#191919"></path><path d="M14.4397 7.44608C15.304 12.6927 19.4133 17.0269 24.6599 17.8911L25.431 18.0164C25.9129 18.0967 26.3498 17.724 26.3498 17.2357V9.01074C26.3498 7.89588 25.6751 6.89346 24.6438 6.46937C22.5619 5.61796 18.8221 4.31032 14.8574 4.00188C14.3498 3.96333 14.0863 4.52558 14.1474 4.92076L14.4365 7.44286L14.4397 7.44608Z" fill="#191919"></path><path d="M24.6566 20.1924C17.4887 21.6061 14.1602 26.3708 14.1602 35.3925C14.1602 35.8455 14.61 36.1572 14.9859 35.9066C18.2823 33.6833 25.5369 27.8808 26.2855 20.6197C26.3145 19.7041 25.1707 20.1346 24.6566 20.1924Z" fill="#191919"></path><path d="M1.69196 20.1963C8.85988 21.61 12.1884 26.3747 12.1884 35.3964C12.1884 35.8494 11.7386 36.1611 11.3627 35.9105C8.0663 33.6872 0.811637 27.8847 0.0630382 20.6236C0.0341223 19.708 1.1779 20.1385 1.69196 20.1963Z" fill="#191919"></path></g><defs><clipPath id="clip0_13131_4833"><rect width="152" height="40" fill="#191919"></rect></clipPath></defs></svg></a><div class="sc-dd041119-10 lmuCEj"><button aria-label="Menu" aria-expanded="false" class="sc-dd041119-11 librYF"><span class="sc-dd041119-12 kMlQXP"></span></button></div><section class="sc-48604b4d-0 fahHZk"><ul class="sc-48604b4d-1 dYTUtR"><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Entwickler</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Entwickler</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/" rel="external">Zentrum für Entwickler</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/resources/code-samples" rel="external">Code-Beispiele</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/resources/guides" rel="external">Anleitungen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" rel="external">Erschließen der Identität – Podcasts</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/newsletter" rel="external">Null-Index Newsletter</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Entwicklertools</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://openidconnect.net/" rel="external">OIDC Connect Übungsplatz</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://samltool.io/" rel="external">SAML-Tool</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="http://jwt.io/" rel="external">JWT.io</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="http://webauthn.me/" rel="external">Webauthn.me</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Beteiligen Sie sich</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://developer.auth0.com/events" rel="external">Ereignisse</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/research-program" rel="external">Auth0-Forschungsprogramm</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Dokumentation</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Dokumentation</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs" rel="external">Auth0-Dokumentationen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/articles" rel="external">Artikel</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/quickstarts" rel="external">Quickstarts</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/api" rel="external">APIs</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/docs/libraries" rel="external">SDK-Bibliotheken</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Support-Center</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/" rel="external">Community</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://support.auth0.com/" rel="external">Support</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/c/help/6" rel="external">Hilfe</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://community.auth0.com/c/faq/42" rel="external">FAQs</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://marketplace.auth0.com" rel="external">Erkunden Sie Auth0 Marketplace</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/resources" rel="external">Ressourcen</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/blog/de/" rel="external">Blog</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/learn" rel="external">Lernen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/intro-to-iam" rel="external">Einführung in IAM (CIAM)</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Produkt</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Plattform</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/platform/access-management" rel="external">Zugriffsmanagement</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/platform/extensibility" rel="external">Erweiterbarkeit</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/platform/login-security" rel="external">Sicherheit</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/platform/user-management" rel="external">Nutzerverwaltung</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/platform/authentication" rel="external">Authentifizierung</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://auth0.com/de/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fOVXAi cGdNT">Plattform ansehen</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Funktionen</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/universal-login" rel="external">Universelles Login</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/single-sign-on" rel="external">Single Sign On</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/multifactor-authentication" rel="external">Multi-Faktor-Authentifizierung</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/actions" rel="external">Aktionen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/machine-to-machine" rel="external">Von Maschine zu Maschine</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/passwordless" rel="external">Passwortlos</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/features/breached-passwords" rel="external">Passwortlecks</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="https://auth0.com/de/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 fOVXAi cGdNT">Funktionen ansehen</a></li></ul></div></div></li><li class="sc-48604b4d-2 bBPBdn"><p class="sc-48604b4d-5 iqISjd">Lösungen</p><div class="sc-48604b4d-6 jqBJbC"><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Branchen</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/financial-services" rel="external">Finanzdienstleistungen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/healthcare" rel="external">Gesundheitswesen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/retail" rel="external">Einzelhandel</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/b2b-saas" rel="external">B2B SaaS</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/media-publishing" rel="external">Medien und Verlagswesen</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/nonprofits" rel="external">Gemeinnützige und Hilfsorganisationen</a></li></ul></div><div class="sc-48604b4d-7 kzEdNm"><p class="sc-48604b4d-8 iDtUXN">Anwendungsfälle</p><ul class="sc-48604b4d-10 dIBWQm"><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/b2c-customer-identity-management" rel="external">CIAM</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/b2b-enterprise-identity-management" rel="external">B2B</a></li><li class="sc-48604b4d-11 dBWnDJ"><a href="/de/b2e-identity-management-for-employees" rel="external">B2E</a></li></ul></div></div></li><li class="sc-48604b4d-2 sc-48604b4d-3 bBPBdn UJeau"><a href="/de/pricing/" rel="external" class="sc-48604b4d-4 dcBPNJ">Preise</a></li><li class="sc-48604b4d-2 sc-48604b4d-3 bBPBdn UJeau"><div class="sc-48604b4d-13 bOieih"><svg width="20" height="20" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke="#191919" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><p class="sc-48604b4d-14 cSezqg">Sprache</p></div><select class="sc-48604b4d-12 hMidHS"><option value="de" selected="">Deutsch</option><option value="en">English</option><option value="fr">Français</option><option value="es">Español</option><option value="pt">Português</option><option value="ja">日本語</option></select></li></ul><div class="sc-48604b4d-15 kJKosn"><div class="sc-48604b4d-18 hydWjh"><a rel="external" href="/de/signup?place=header&type=button&text=registrieren" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cJRWJS dCCmSO"><span>Registrieren</span></a><a href="/api/auth/login?redirectTo=dashboard" rel="external" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 gsHAMX dCCmSO"><span>Anmelden</span></a></div><a href="/de/contact-us?place=header&type=button&text=sales%20kontaktieren" role="button" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 iBRLYD isBdzo"><span>Sales kontaktieren</span></a></div></section></nav><nav aria-label="Desktop nav" class="sc-dd041119-6 cdYdvX"><div class="sc-dd041119-7 SNAUb"><a rel="external" href="/de/" aria-label="Auth0 logo" class="sc-dd041119-4 hvNmHd"><svg xmlns="http://www.w3.org/2000/svg" width="152" height="40" viewBox="0 0 152 40" fill="none"><g clip-path="url(#clip0_13131_4833)"><path d="M34.7188 26.5791L39.6939 13.5352H41.6133L46.5698 26.5791H44.8367L43.4578 23.0571H37.7748L36.3959 26.5791H34.7188ZM38.2593 21.585H42.9739L40.6073 15.3054L38.2593 21.585Z" fill="#191919"></path><path d="M53.7713 17.0793H55.2993V26.5827H53.9763L53.7713 25.3155C53.2123 26.0237 52.2992 26.6945 50.7338 26.6945C48.6468 26.6945 46.9883 25.5208 46.9883 22.3716V17.0793H48.5163V22.2784C48.5163 24.2534 49.4108 25.2972 50.9947 25.2972C52.7278 25.2972 53.7713 23.9742 53.7713 21.8312V17.0793Z" fill="#191919"></path><path d="M57.7453 18.4754H56.0312V17.0778H57.7453V14.4131H59.2734V17.0778H61.7331V18.4754H59.2734V24.0845C59.2734 24.8854 59.5529 25.1839 60.3728 25.1839H61.8822V26.5815H60.2237C58.3975 26.5815 57.7453 25.7802 57.7453 24.1031V18.4754Z" fill="#191919"></path><path d="M71.2348 21.2868V26.5791H69.7067V21.38C69.7067 19.4051 68.7564 18.3612 67.1165 18.3612C65.3462 18.3612 64.2468 19.6839 64.2468 21.8269V26.5788H62.7188V13.5352H64.2468V18.641C64.8058 17.7466 65.7748 16.9636 67.3774 16.9636C69.5018 16.9636 71.2348 18.1376 71.2348 21.2868Z" fill="#191919"></path><path d="M72.6543 19.7613C72.6543 16.053 74.6668 13.4255 77.6108 13.4255C80.5364 13.4255 82.549 16.053 82.549 19.7613V20.3576C82.549 24.2519 80.5364 26.6931 77.6108 26.6931C74.6668 26.6931 72.6543 24.2519 72.6543 20.3576V19.7613ZM80.965 19.8172C80.965 16.7239 79.6233 14.8604 77.6108 14.8604C75.5799 14.8604 74.2382 16.7239 74.2382 19.8172V20.3017C74.2382 23.3951 75.5799 25.2585 77.6108 25.2585C79.6237 25.2585 80.965 23.3951 80.965 20.3017V19.8172Z" fill="#191919"></path><path d="M98.0691 21.8272C98.0691 24.7343 96.1311 26.6909 93.5036 26.6909C91.901 26.6909 90.8202 26.039 90.2429 25.1259L90.0376 26.5791H88.7148V13.5352H90.2429V18.6035C90.8765 17.7273 91.901 16.9636 93.5036 16.9636C96.1308 16.9636 98.0691 18.7342 98.0691 21.8272ZM96.5035 21.8272C96.5035 19.7588 95.2363 18.3243 93.3542 18.3243C91.4908 18.3243 90.2236 19.7591 90.2236 21.7903C90.2236 23.8771 91.4908 25.3309 93.3542 25.3309C95.2363 25.3306 96.5035 23.8957 96.5035 21.8272Z" fill="#191919"></path><path d="M98.0117 17.0752H99.6329L102.559 24.6592L105.391 17.0752H107.012L102.633 28.1811C102.037 29.7092 101.682 30.3051 100.341 30.3051H98.5145V28.9075H99.8745C100.751 28.9075 100.899 28.6839 101.254 27.7895L101.719 26.6341L98.0117 17.0752Z" fill="#191919"></path><path d="M118.431 26.6928C114.76 26.6928 112.207 23.8979 112.207 20.0591C112.207 16.2207 114.76 13.4255 118.431 13.4255C122.102 13.4255 124.655 16.2207 124.655 20.0591C124.655 23.8976 122.102 26.6928 118.431 26.6928ZM118.431 25.202C121.151 25.202 122.996 23.059 122.996 20.0588C122.996 17.0587 121.151 14.9157 118.431 14.9157C115.71 14.9157 113.865 17.0587 113.865 20.0588C113.865 23.059 115.71 25.202 118.431 25.202Z" fill="#191919"></path><path d="M126.182 13.5352H127.71V22.1254L132.48 17.0754H134.362L130.654 21.007L134.623 26.5788H132.778L129.629 22.1065L127.71 24.0817V26.5784H126.182V13.5352H126.182Z" fill="#191919"></path><path d="M136.464 18.4754H134.75V17.0778H136.464V14.4131H137.992V17.0778H140.452V18.4754H137.992V24.0845C137.992 24.8854 138.272 25.1839 139.092 25.1839H140.601V26.5815H138.942C137.116 26.5815 136.464 25.7802 136.464 24.1031V18.4754Z" fill="#191919"></path><path d="M150.414 25.1837V26.5813H149.576C148.309 26.5813 147.88 26.0409 147.861 25.1092C147.265 25.9664 146.315 26.6931 144.675 26.6931C142.588 26.6931 141.172 25.6496 141.172 23.9165C141.172 22.0158 142.495 20.9536 144.992 20.9536H147.787V20.3014C147.787 19.0719 146.911 18.3265 145.421 18.3265C144.079 18.3265 143.184 18.96 142.998 19.929H141.47C141.694 18.0653 143.203 16.9658 145.495 16.9658C147.918 16.9658 149.315 18.1774 149.315 20.3946V24.5501C149.315 25.0533 149.502 25.184 149.93 25.184L150.414 25.1837ZM147.787 22.2394H144.843C143.483 22.2394 142.719 22.7426 142.719 23.8234C142.719 24.7551 143.52 25.3887 144.787 25.3887C146.688 25.3887 147.788 24.2892 147.788 22.7053V22.2394H147.787Z" fill="#191919"></path><path d="M1.68997 17.8918C6.93659 17.0276 11.0459 12.6902 11.9101 7.44679L12.1993 4.92469C12.27 4.52308 12.0001 3.96725 11.4924 4.00581C7.52776 4.31424 3.79119 5.62188 1.70604 6.47329C0.674703 6.89418 0 7.89981 0 9.01467V17.2396C0 17.728 0.43695 18.0975 0.918881 18.0203L1.68997 17.895V17.8918Z" fill="#191919"></path><path d="M14.4397 7.44608C15.304 12.6927 19.4133 17.0269 24.6599 17.8911L25.431 18.0164C25.9129 18.0967 26.3498 17.724 26.3498 17.2357V9.01074C26.3498 7.89588 25.6751 6.89346 24.6438 6.46937C22.5619 5.61796 18.8221 4.31032 14.8574 4.00188C14.3498 3.96333 14.0863 4.52558 14.1474 4.92076L14.4365 7.44286L14.4397 7.44608Z" fill="#191919"></path><path d="M24.6566 20.1924C17.4887 21.6061 14.1602 26.3708 14.1602 35.3925C14.1602 35.8455 14.61 36.1572 14.9859 35.9066C18.2823 33.6833 25.5369 27.8808 26.2855 20.6197C26.3145 19.7041 25.1707 20.1346 24.6566 20.1924Z" fill="#191919"></path><path d="M1.69196 20.1963C8.85988 21.61 12.1884 26.3747 12.1884 35.3964C12.1884 35.8494 11.7386 36.1611 11.3627 35.9105C8.0663 33.6872 0.811637 27.8847 0.0630382 20.6236C0.0341223 19.708 1.1779 20.1385 1.69196 20.1963Z" fill="#191919"></path></g><defs><clipPath id="clip0_13131_4833"><rect width="152" height="40" fill="#191919"></rect></clipPath></defs></svg></a><ul role="menubar" class="sc-dd041119-13 hxYec"><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 iLTAgf"><div class="sc-dd041119-15 fIvfJ"><span>Entwickler</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS vgaOL"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Entwickler</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Zentrum für Entwickler</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Code-Beispiele</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/resources/guides" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Anleitungen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Erschließen der Identität – Podcasts</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Null-Index Newsletter</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS juzMWM"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Entwicklertools</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://openidconnect.net/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">OIDC Connect Übungsplatz</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://samltool.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">SAML-Tool</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="http://jwt.io/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">JWT.io</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="http://webauthn.me/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Webauthn.me</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS cmuXnw"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Beteiligen Sie sich</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Ereignisse</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Auth0-Forschungsprogramm</a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 iLTAgf"><div class="sc-dd041119-15 fIvfJ"><span>Dokumentation</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS elvwLW"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Dokumentation</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Auth0-Dokumentationen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Artikel</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Quickstarts</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">APIs</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">SDK-Bibliotheken</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS hkOlGh"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Support-Center</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Community</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Support</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Hilfe</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">FAQs</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Erkunden Sie Auth0 Marketplace</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Ressourcen</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS edUBug"><div class="sc-1e1df8de-0 sc-1e1df8de-2 ihoJjn eyReJT"><div class="sc-8eff408f-0 dqITBV"><span class="sc-8eff408f-1 fezdDx"></span><div class="sc-8eff408f-2 bgvTYt"><svg viewBox="0 0 15 16" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M13.9491 4.94422L12.3416 0H7.14765L8.75299 4.94422H13.9491ZM7.14765 0H1.95448L0.349875 4.94422H5.54305L7.14765 0ZM0.349875 4.94422C-0.116607 6.38132 -0.116625 7.92936 0.349824 9.36647C0.816273 10.8036 1.72524 12.056 2.94646 12.9442L4.55106 8L0.349875 4.94422ZM13.9462 4.94422L9.74203 8L11.3466 12.9442C12.5689 12.0568 13.479 10.8047 13.9466 9.36755C14.4141 7.93038 14.415 6.38193 13.9491 4.94422H13.9462ZM2.94646 12.9442L7.14839 16L11.3496 12.9442L7.14765 9.88844L2.94646 12.9442Z" fill="black"></path></svg></div></div></div><div class="sc-4b4277c0-0 fBHclw"></div><div class="sc-4b4277c0-1 cRKzFM"><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/blog/de/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Blog</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Lernen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Einführung in IAM (CIAM)</a></li></ul></div></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 iLTAgf"><div class="sc-dd041119-15 fIvfJ"><span>Produkt</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS vgaOL"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Plattform</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Zugriffsmanagement</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Erweiterbarkeit</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Sicherheit</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Nutzerverwaltung</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Authentifizierung</a></li></ul><div class="sc-c4163730-4 eXTZJw"><a href="https://auth0.com/de/platform" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cUdGaW gtyRnh">Plattform ansehen</a></div></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS juzMWM"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Funktionen</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Universelles Login</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Single Sign On</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Multi-Faktor-Authentifizierung</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Aktionen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Von Maschine zu Maschine</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Passwortlos</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/features/breached-passwords" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Passwortlecks</a></li></ul><div class="sc-c4163730-4 eXTZJw"><a href="https://auth0.com/de/features" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 cUdGaW gtyRnh">Funktionen ansehen</a></div></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS ftjeVJ"><ul class="sc-31a2510-0 eqdKOL"><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/resources/videos/platform-introduction-video-2020" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Plattformübersicht</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Entdecken Sie unsere Plattform in einem kurzen Video</p></div></a></li><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/de/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Cloud-Instanzen</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Nutzen Sie Auth0 in der Cloud, so wie Sie es möchten</p></div></a></li><li class="sc-31a2510-1 AyFjn"><a rel="external" href="/marketplace" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 gAIXCo BcxXA"><div><p>Auth0 Marktplatz</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU dFMMlW">Entdecken Sie bestehende Integrationen, um Ihr Identitätsmanagement noch mächtiger zu machen</p></div></a></li></ul></section></section></div></li><li role="menuitem" aria-haspopup="true" tabindex="0" class="sc-dd041119-16 iLTAgf"><div class="sc-dd041119-15 fIvfJ"><span>Lösungen</span><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"><g id="chevron-down"><path id="icon" fill-rule="evenodd" clip-rule="evenodd" d="M7.99994 9.93934L12.4696 5.46967L13.5303 6.53033L8.53027 11.5303C8.23738 11.8232 7.76251 11.8232 7.46961 11.5303L2.46961 6.53033L3.53027 5.46967L7.99994 9.93934Z" fill="#FFFEFA"></path></g></svg></div><div class="sc-dd041119-14 ZBdFw"><section class="sc-dd041119-17 ecCLmy"><section class="sc-8f844919-0 sc-8f844919-1 fpHhIS elvwLW"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj bHQaKS">Branchen</p><ul role="menubar" class="sc-c4163730-1 kPRjAI"><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/financial-services" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Finanzdienstleistungen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/healthcare" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Gesundheitswesen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/retail" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Einzelhandel</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/b2b-saas" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">B2B SaaS</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/de/media-publishing" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Medien und Verlagswesen</a></li><li role="menuitem" class="sc-c4163730-2 jfwYlN"><a rel="external" href="/nonprofits" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI fwumGB">Gemeinnützige und Hilfsorganisationen</a></li></ul></section><section class="sc-8f844919-0 sc-8f844919-2 fpHhIS hkOlGh"><div class="sc-8583e179-0 kqrdVl"><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj ierwBG">Anwendungsfälle</p><a rel="external" href="/de/b2c-customer-identity-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>CIAM</span> - Für Ihre Endkunden</a><a rel="external" href="/de/b2b-enterprise-identity-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>B2B</span> - Für Ihre Geschäftskunden</a><a rel="external" href="/de/b2e-identity-management-for-employees" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>B2E</span> - Für Ihre Mitarbeiter</a><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj ierwBG">FALLSTUDIEN</p><a rel="external" href="/de/customers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 kVqgZI bHOya"><span>Lesen Sie die Geschichten unserer Kunden</span></a></div></section><section class="sc-8f844919-0 sc-8f844919-3 fpHhIS edUBug"><a href="/de/forrester-total-economic-impact" rel="external" class="sc-1e1df8de-0 ihoJjn"><div class="sc-1e1df8de-1 jDuOPS"><img loading="lazy" src="https://cdn.auth0.com/website/header/solutions/forrester-report.png" alt="" class="sc-1e1df8de-3 iiLmVo"/><div><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 ieuKTj eDrEVh">FORRESTER BERICHT</p><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 eievug bdeJQk">The Total Economic Impact of Auth0</p></div></div></a></section></section></div></li><li role="menuitem" aria-haspopup="false" class="sc-dd041119-16 iLTAgf"><a href="/de/pricing/" rel="external" class="sc-dd041119-15 fIvfJ"><span>Preise</span></a></li></ul><div class="sc-dd041119-8 goqQNV"><a role="button" rel="external" href="/de/signup?place=header&type=button&text=registrieren" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 cJRWJS blScNC"><span>Registrieren</span></a><a role="button" rel="external" href="/de/contact-us?place=header&type=button&text=sales%20kontaktieren" tabindex="0" class="styled__Button-sc-1hwml9q-0 utils-sc-11hlfw-0 gsHAMX kRzliz"><span>Sales kontaktieren</span></a></div></div></nav></header><main><section class="sc-527f19d-0 goMtfQ"><div class="sc-527f19d-1 lhJrRr"><h1 class="styled__Heading-sc-165cfko-2 utils-sc-11hlfw-0 etkYET eHMTIY">Ressourcen</h1><div class="sc-527f19d-5 fcFyPA"><div class="sc-527f19d-6 OrXVW"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="sc-527f19d-7 eEWXUq"><path d="M11 19a8 8 0 100-16 8 8 0 000 16zM21 21l-4.35-4.35" stroke="#606060" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path></svg><input type="text" placeholder="Suche" class="sc-527f19d-8 cHZRhB" value=""/></div><div class="sc-527f19d-9 fGcUkc"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true"><path d="M12 22c5.523 0 10-4.477 10-10S17.523 2 12 2 2 6.477 2 12s4.477 10 10 10zM2 12h20" stroke="#42464D"></path><path d="M12 2a15.3 15.3 0 014 10 15.3 15.3 0 01-4 10 15.3 15.3 0 01-4-10 15.3 15.3 0 014-10v0z" stroke="#42464D"></path></svg><select class="sc-527f19d-10 jgLKGs"><option value="" disabled="">Language</option><option value="EN">English</option><option value="DE" selected="">Deutsch</option><option value="ES">Español</option><option value="FR">Français</option><option value="JP">日本語</option><option value="PT">Português</option></select></div></div></div><div class="sc-527f19d-4 bSdvZL"><ul class="sc-527f19d-17 fIEFZB"><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources">Alle Ressourcen</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources/ebooks">E-Books</a></li><li class="sc-527f19d-18 iEGZFq"><a aria-label="link to resource " href="/de/resources/webinars">Webinare</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources/videos">Videos</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources/whitepapers">Whitepapers</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources/podcasts">Podcasts</a></li><li class="sc-527f19d-18 fkPsWQ"><a aria-label="link to resource " href="/de/resources/upcoming-webinars">Geplante Webinare</a></li></ul></div><div class="sc-527f19d-3 fpOVHv"><a aria-label="link to Es ist doch nur eine Login-Box: Kaufen oder selbst machen?" class="sc-527f19d-12 gmktfe" href="/resources/webinars/es-ist-doch-nur-eine-login-box-kaufen-oder-selbst-machen"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/5RD54TmyQPpqpa0aJIW1g4/9a61f66cfcfa78f37297f261082cade8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/5RD54TmyQPpqpa0aJIW1g4/9a61f66cfcfa78f37297f261082cade8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/5RD54TmyQPpqpa0aJIW1g4/9a61f66cfcfa78f37297f261082cade8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560" aria-hidden="false" alt="Es ist doch nur eine Login-Box: Kaufen oder selbst machen?" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Es ist doch nur eine Login-Box: Kaufen oder selbst machen?</h2></a><a aria-label="link to Sicherheit oder Nutzerfreundlichkeit?" class="sc-527f19d-12 gmktfe" href="/resources/webinars/sicherheit-oder-nutzerfreundlichkeit"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1HpH6l1EN8OGYQddsWKQ5k/9c69190b0ee8ac92bd20ad70a0ab4271/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1HpH6l1EN8OGYQddsWKQ5k/9c69190b0ee8ac92bd20ad70a0ab4271/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1HpH6l1EN8OGYQddsWKQ5k/9c69190b0ee8ac92bd20ad70a0ab4271/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560" aria-hidden="false" alt="Sicherheit oder Nutzerfreundlichkeit?" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Sicherheit oder Nutzerfreundlichkeit?</h2></a><a aria-label="link to Kundenerlebnis mit CIAM: reibungslos und sicher" class="sc-527f19d-12 gmktfe" href="/resources/webinars/kundenerlebnis-mit-ciam-reibungslos-und-sicher"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1ZIfg8rScURo2YTnfSKZAU/862a0ce55e10fb44963331d75c73614f/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1ZIfg8rScURo2YTnfSKZAU/862a0ce55e10fb44963331d75c73614f/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1ZIfg8rScURo2YTnfSKZAU/862a0ce55e10fb44963331d75c73614f/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560" aria-hidden="false" alt="Kundenerlebnis mit CIAM: reibungslos und sicher" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Kundenerlebnis mit CIAM: reibungslos und sicher</h2></a><a aria-label="link to eID: Maximales Vertrauen in einer digitalen Welt" class="sc-527f19d-12 gmktfe" href="/resources/webinars/eid-maximales-vertrauen-in-einer-digitalen-welt"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/3myEnUHSSkbnnaREK3cGZu/9b4ec219fd583a7930229643f9fa01a3/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/3myEnUHSSkbnnaREK3cGZu/9b4ec219fd583a7930229643f9fa01a3/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/3myEnUHSSkbnnaREK3cGZu/9b4ec219fd583a7930229643f9fa01a3/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560" aria-hidden="false" alt="eID: Maximales Vertrauen in einer digitalen Welt" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">eID: Maximales Vertrauen in einer digitalen Welt</h2></a><a aria-label="link to Hybride Moderne Authentifizierung: das neue Normal im Retail" class="sc-527f19d-12 gmktfe" href="/resources/webinars/hybride-moderne-authentifizierung-das-neue-normal-im-retail"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7JOzEFfdt8xQP275EyOTSI/822e9d65d915cb488c78d9d29643803c/hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7JOzEFfdt8xQP275EyOTSI/822e9d65d915cb488c78d9d29643803c/hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7JOzEFfdt8xQP275EyOTSI/822e9d65d915cb488c78d9d29643803c/hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg?w=560" aria-hidden="false" alt="Hybride Moderne Authentifizierung: das neue Normal im Retail" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Hybride Moderne Authentifizierung: das neue Normal im Retail</h2></a><a aria-label="link to Komplexe Identitäten - Der einfache Weg!" class="sc-527f19d-12 gmktfe" href="/resources/webinars/complex-identity-de"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/6VoE9JxeajbSOuVpIHWIig/264d6e61a6bc3b0580b908329756430a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/6VoE9JxeajbSOuVpIHWIig/264d6e61a6bc3b0580b908329756430a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/6VoE9JxeajbSOuVpIHWIig/264d6e61a6bc3b0580b908329756430a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg?w=560" aria-hidden="false" alt="Komplexe Identitäten - Der einfache Weg!" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Komplexe Identitäten - Der einfache Weg!</h2></a><a aria-label="link to Technical Masterclass 2021: Hürden und Helfer in der Benutzermigration" class="sc-527f19d-12 gmktfe" href="/resources/webinars/technical-masterclass-2021-12-dach"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/4VuiXT7J80b5XsRg1MDZ1f/d875ac07ffe4f5494e367adfba34eab9/-Landing_Page-_Gated_Content_-_Technical_Masterclass_2021__625x892px_.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/4VuiXT7J80b5XsRg1MDZ1f/d875ac07ffe4f5494e367adfba34eab9/-Landing_Page-_Gated_Content_-_Technical_Masterclass_2021__625x892px_.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/4VuiXT7J80b5XsRg1MDZ1f/d875ac07ffe4f5494e367adfba34eab9/-Landing_Page-_Gated_Content_-_Technical_Masterclass_2021__625x892px_.png?w=560" aria-hidden="false" alt="Technical Masterclass 2021: Hürden und Helfer in der Benutzermigration" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Technical Masterclass 2021: Hürden und Helfer in der Benutzermigration</h2></a><a aria-label="link to Identity Strategy: Was brauchen Sie um erfolgreich zu sein?" class="sc-527f19d-12 gmktfe" href="/resources/webinars/identity-strategy-dach-rec"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/3pOpbobbk1VdwOdRsyEkn8/c1de7ccab1b8af31dda5eed2d424e06d/dach-webinar-2021-11.jpg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/3pOpbobbk1VdwOdRsyEkn8/c1de7ccab1b8af31dda5eed2d424e06d/dach-webinar-2021-11.jpg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/3pOpbobbk1VdwOdRsyEkn8/c1de7ccab1b8af31dda5eed2d424e06d/dach-webinar-2021-11.jpg?w=560" aria-hidden="false" alt="Identity Strategy: Was brauchen Sie um erfolgreich zu sein?" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Identity Strategy: Was brauchen Sie um erfolgreich zu sein?</h2></a><a aria-label="link to Identitätsmanagement als Lupe in Ihre Anwendung" class="sc-527f19d-12 gmktfe" href="/resources/webinars/identitasmanagement-oparco-partner-webinar"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/4XhKDaCEioEe82q9lPRFkq/c009350f0f27a18f73d9cd9c1a1458ea/identity-management-de.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/4XhKDaCEioEe82q9lPRFkq/c009350f0f27a18f73d9cd9c1a1458ea/identity-management-de.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/4XhKDaCEioEe82q9lPRFkq/c009350f0f27a18f73d9cd9c1a1458ea/identity-management-de.jpeg?w=560" aria-hidden="false" alt="Identitätsmanagement als Lupe in Ihre Anwendung" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Identitätsmanagement als Lupe in Ihre Anwendung</h2></a><a aria-label="link to Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen" class="sc-527f19d-12 gmktfe" href="/resources/webinars/modernes-ciam"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/1mxjhuxeVe47kr5AF9EY5m/4a65fb1ad4a8b8c07ea5e85542c8c5ed/Auth0-Resource_Cover-iC-Consult.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/1mxjhuxeVe47kr5AF9EY5m/4a65fb1ad4a8b8c07ea5e85542c8c5ed/Auth0-Resource_Cover-iC-Consult.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/1mxjhuxeVe47kr5AF9EY5m/4a65fb1ad4a8b8c07ea5e85542c8c5ed/Auth0-Resource_Cover-iC-Consult.png?w=560" aria-hidden="false" alt="Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen</h2></a><a aria-label="link to Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!" class="sc-527f19d-12 gmktfe" href="/resources/webinars/identitatsmanagement-webinar-de"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7jr0wXzKoy5En25iMILhqB/b187c6b8a41cf2d78ce0ef939f038fde/Auth0-Resource_Cover-PwC-GC__1_.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7jr0wXzKoy5En25iMILhqB/b187c6b8a41cf2d78ce0ef939f038fde/Auth0-Resource_Cover-PwC-GC__1_.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7jr0wXzKoy5En25iMILhqB/b187c6b8a41cf2d78ce0ef939f038fde/Auth0-Resource_Cover-PwC-GC__1_.png?w=560" aria-hidden="false" alt="Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!</h2></a><a aria-label="link to Erfolgreiche Apps & APIs im B2B-Geschäft" class="sc-527f19d-12 gmktfe" href="/resources/webinars/tekaris-partner-webinar"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/7ojY9VA3N1gmSPja0Y9v6S/ace3e8d67b93595d27008349d2c5078b/Auth0-Resource_Cover-Tekaris-GC.png?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/7ojY9VA3N1gmSPja0Y9v6S/ace3e8d67b93595d27008349d2c5078b/Auth0-Resource_Cover-Tekaris-GC.png?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/7ojY9VA3N1gmSPja0Y9v6S/ace3e8d67b93595d27008349d2c5078b/Auth0-Resource_Cover-Tekaris-GC.png?w=560" aria-hidden="false" alt="Erfolgreiche Apps & APIs im B2B-Geschäft" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Erfolgreiche Apps & APIs im B2B-Geschäft</h2></a><a aria-label="link to Auth0 + Computerwoche: Komfort und Sicherheit im Identity Management" class="sc-527f19d-12 gmktfe" href="/resources/webinars/komfort-und-sicherheit-im-identity-management"><div class="sc-527f19d-13 laBlzA"><picture><source srcSet="//images.ctfassets.net/2ntc334xpx65/3pJHvEv86aqn8esqhqALQp/3a53abc1634c666bb4e47d839d7fbf00/Resources_Page__Cover.jpeg?w=560&fm=webp" type="image/webp"/><source srcSet="//images.ctfassets.net/2ntc334xpx65/3pJHvEv86aqn8esqhqALQp/3a53abc1634c666bb4e47d839d7fbf00/Resources_Page__Cover.jpeg?w=560"/><img loading="eager" src="//images.ctfassets.net/2ntc334xpx65/3pJHvEv86aqn8esqhqALQp/3a53abc1634c666bb4e47d839d7fbf00/Resources_Page__Cover.jpeg?w=560" aria-hidden="false" alt="Auth0 + Computerwoche: Komfort und Sicherheit im Identity Management" class="sc-527f19d-11 bIlYES"/></picture></div><p class="sc-527f19d-15 lfPVOF">Webinare</p><h2 class="sc-527f19d-14 kkgLIr">Auth0 + Computerwoche: Komfort und Sicherheit im Identity Management</h2></a></div></section><section class="sc-3e4086c7-0 hdUzyc"><div class="sc-3e4086c7-1 fEObSb"><h3 class="sc-3e4086c7-2 eBkOFK"><span><p>Sicherer Zugriff für alle.<br /> Aber nicht für einfach jeden.</p> </span></h3><div class="sc-3e4086c7-3 ggNbtU"><button class="sc-3e4086c7-4 hwtIDu">Probieren Sie Auth0 kostenlos aus</button><button class="sc-3e4086c7-4 cNWeht">Sprechen Sie mit dem Vertrieb</button></div></div></section></main><div class="sc-da5983f0-0 fvscCL"><footer class="sc-da5983f0-1 ezfOZF"><nav class="sc-da5983f0-2 fKRHFw"><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Entwickler</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/resources" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Entwickler-Hub<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/resources/code-samples" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Codebeispiele und Anleitungen<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/blog/developers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog-Beiträge<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://identityunlocked.auth0.com/public/49/Identity,-Unlocked.--bed7fada" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Erschließen der Identität – Podcasts<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/newsletter" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Null-Index Newsletter<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Dokumentation</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/articles" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Artikel<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/quickstarts" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Codebeispiele und Anleitungen<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/api" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">APIs<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/docs/libraries" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">SDK-Bibliotheken<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/blog/de/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/de/resources/ebooks" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Berichte<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/de/resources/webinars" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Webinare<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Beteiligen Sie sich</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Forum<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://developer.auth0.com/events" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Ereignisse<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/research-program" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Auth0-Forschungsprogramm<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Unternehmen</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/de/customers" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Kunden<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Sicherheit, Datenschutz und Compliance<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/partners" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Partner<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://www.okta.com/company/careers/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Karriere<!-- --> <span class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 gDDDRz dmQvNV">Wir stellen ein!</span></a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://www.okta.com/okta-and-auth0/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Okta + Auth0<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Support-Center</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Community<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://support.auth0.com/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Support-Center<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/c/help/6" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Hilfe<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://community.auth0.com/c/faq/42" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">FAQs<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://marketplace.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Auth0 Marktplatz<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Lernen</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/de/learn" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Lernen<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/intro-to-iam" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Einführung in IAM (CIAM)<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="https://auth0.com/blog/de/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Blog<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Plattform</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/access-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Zugriffsmanagement<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/extensibility" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Erweiterbarkeit<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/login-security" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Sicherheit<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/user-management" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Nutzerverwaltung<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Authentifizierung<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/platform/cloud-deployment" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Cloud-Instanzen<!-- --> </a></li></ul></section><section><p class="styled__Overline-sc-165cfko-0 utils-sc-11hlfw-0 dveEmL dLXTcP">Anwendungsfälle</p><ul class="sc-da5983f0-3 ZAOkc"><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/universal-login" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Universelles Login<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/single-sign-on" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Single Sign On<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/multifactor-authentication" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Multi-Faktor-Authentifizierung<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/actions" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Aktionen<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/machine-to-machine" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Von Maschine zu Maschine<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/passwordless" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Passwortlos<!-- --> </a></li><li class="sc-da5983f0-5 cXUMOl"><a href="/de/features/breached-passwords/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn cHhniM">Paswortlecks<!-- --> </a></li></ul></section><section class="sc-da5983f0-6 dsTXTr"><div class="sc-da5983f0-7 bkTsFr"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 kuTTBJ"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div></section></nav><section class="sc-da5983f0-10 dceiQn"><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU hTUVnp">© <!-- -->2024<!-- --> Okta, Inc. All Rights Reserved.</p><div class="sc-da5983f0-12 fMOddY"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 kwdIoB"><span class="sc-da5983f0-17 fWXPij"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iBuHa-D">Deutsch</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 doMXBO"><ul class="sc-da5983f0-15 eZHkDb"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 hYxKnm">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 hYxKnm">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 hYxKnm">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 hYxKnm">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 hYxKnm">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 hYxKnm">日本語</li></ul></div></span></span></section><section class="sc-da5983f0-9 dFYjGw"><div class="sc-da5983f0-7 gtvNxS"><a href="https://twitter.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Twitter link" class="sc-da5983f0-8 kuTTBJ"><svg viewBox="0 0 24 24" aria-hidden="true" width="24" height="24" fill="none"><g><path fill="#1e212a" d="M18.244 2.25h3.308l-7.227 8.26 8.502 11.24H16.17l-5.214-6.817L4.99 21.75H1.68l7.73-8.835L1.254 2.25H8.08l4.713 6.231zm-1.161 17.52h1.833L7.084 4.126H5.117z"></path></g></svg></a><a href="https://linkedin.com/company/auth0" target="_blank" rel="noopener noreferrer" aria-label="Linkedin link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M19.5561 3H4.53738C3.71707 3 2.99988 3.59063 2.99988 4.40156V19.4531C2.99988 20.2687 3.71707 20.9953 4.53738 20.9953H19.5514C20.3764 20.9953 20.9952 20.2641 20.9952 19.4531V4.40156C20.9999 3.59063 20.3764 3 19.5561 3ZM8.578 18H5.99988V9.98438H8.578V18ZM7.378 8.76562H7.35925C6.53425 8.76562 5.99988 8.15156 5.99988 7.38281C5.99988 6.6 6.54831 6 7.39206 6C8.23581 6 8.75144 6.59531 8.77019 7.38281C8.77019 8.15156 8.23581 8.76562 7.378 8.76562ZM17.9999 18H15.4218V13.6172C15.4218 12.5672 15.0468 11.85 14.1139 11.85C13.4014 11.85 12.9796 12.3328 12.7921 12.8016C12.7218 12.9703 12.703 13.2 12.703 13.4344V18H10.1249V9.98438H12.703V11.1C13.078 10.5656 13.6639 9.79688 15.028 9.79688C16.7202 9.79688 17.9999 10.9125 17.9999 13.3172V18Z" fill="#1e212a"></path></svg></a><a href="https://github.com/auth0" target="_blank" rel="noopener noreferrer" aria-label="Github link" class="sc-da5983f0-8 kuTTBJ"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M12 1.5C6.20156 1.5 1.5 6.32344 1.5 12.2672C1.5 17.025 4.50937 21.0562 8.68125 22.4813C8.74687 22.4953 8.80312 22.5 8.85938 22.5C9.24844 22.5 9.39844 22.2141 9.39844 21.9656C9.39844 21.7078 9.38906 21.0328 9.38437 20.1328C8.99062 20.2219 8.63906 20.2594 8.325 20.2594C6.30469 20.2594 5.84531 18.6891 5.84531 18.6891C5.36719 17.4469 4.67813 17.1141 4.67813 17.1141C3.76406 16.4719 4.67344 16.4531 4.74375 16.4531H4.74844C5.80313 16.5469 6.35625 17.5687 6.35625 17.5687C6.88125 18.4875 7.58437 18.7453 8.2125 18.7453C8.70469 18.7453 9.15 18.5859 9.4125 18.4641C9.50625 17.7703 9.77812 17.2969 10.0781 17.025C7.74844 16.7531 5.29688 15.8297 5.29688 11.7047C5.29688 10.5281 5.70469 9.56719 6.375 8.81719C6.26719 8.54531 5.90625 7.44844 6.47812 5.96719C6.47812 5.96719 6.55312 5.94375 6.7125 5.94375C7.09219 5.94375 7.95 6.08906 9.36563 7.07344C10.2047 6.83437 11.1 6.71719 11.9953 6.7125C12.8859 6.71719 13.7859 6.83437 14.625 7.07344C16.0406 6.08906 16.8984 5.94375 17.2781 5.94375C17.4375 5.94375 17.5125 5.96719 17.5125 5.96719C18.0844 7.44844 17.7234 8.54531 17.6156 8.81719C18.2859 9.57188 18.6937 10.5328 18.6937 11.7047C18.6937 15.8391 16.2375 16.7484 13.8984 17.0156C14.2734 17.3484 14.6109 18.0047 14.6109 19.0078C14.6109 20.4469 14.5969 21.6094 14.5969 21.9609C14.5969 22.2141 14.7422 22.5 15.1312 22.5C15.1875 22.5 15.2531 22.4953 15.3187 22.4813C19.4953 21.0562 22.5 17.0203 22.5 12.2672C22.5 6.32344 17.7984 1.5 12 1.5Z" fill="#1e212a"></path></svg></a></div><div class="sc-da5983f0-11 bfQQBn"><div class="sc-da5983f0-12 fMOddY"><a href="https://status.auth0.com" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Status</a> <!-- -->•<!-- --> <a href="https://www.okta.com/agreements/" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Legal</a> <!-- -->•<!-- --> <a href="/privacy" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Privacy</a> <!-- -->•<!-- --> <a href="https://www.okta.com/terms-of-service" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Terms</a> <!-- -->•<!-- --> <a href="/your-privacy-choices" class="styled__Link-sc-bubr9x-0 utils-sc-11hlfw-0 hTVzGn dmQvNV">Your Privacy Choices</a><img alt="" src="https://cdn.auth0.com/website/footer/ccpa.svg"/></div><span class="sc-da5983f0-13 kwdIoB"><span class="sc-da5983f0-17 fWXPij"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M12 22C17.5228 22 22 17.5228 22 12C22 6.47715 17.5228 2 12 2C6.47715 2 2 6.47715 2 12C2 17.5228 6.47715 22 12 22Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path d="M2 12H22" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12 2C14.5013 4.73835 15.9228 8.29203 16 12C15.9228 15.708 14.5013 19.2616 12 22C9.49872 19.2616 8.07725 15.708 8 12C8.07725 8.29203 9.49872 4.73835 12 2V2Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><span aria-haspopup="true" aria-labelledby="language-selector" tabindex="0" class="sc-da5983f0-18 iBuHa-D">Deutsch</span><svg width="8" height="6" viewBox="0 0 8 6" fill="none" xmlns="http://www.w3.org/2000/svg" style="margin-left:0.6rem"><path d="M1 1.5L4 4.5L7 1.5" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path></svg><div class="sc-da5983f0-14 doMXBO"><ul class="sc-da5983f0-15 eZHkDb"><li aria-labelledby="lang-item-Deutsch" tabindex="0" class="sc-da5983f0-16 hYxKnm">Deutsch</li><li aria-labelledby="lang-item-English" tabindex="0" class="sc-da5983f0-16 hYxKnm">English</li><li aria-labelledby="lang-item-Français" tabindex="0" class="sc-da5983f0-16 hYxKnm">Français</li><li aria-labelledby="lang-item-Español" tabindex="0" class="sc-da5983f0-16 hYxKnm">Español</li><li aria-labelledby="lang-item-Português" tabindex="0" class="sc-da5983f0-16 hYxKnm">Português</li><li aria-labelledby="lang-item-日本語" tabindex="0" class="sc-da5983f0-16 hYxKnm">日本語</li></ul></div></span></span></div><p class="styled__Paragraph-sc-165cfko-1 utils-sc-11hlfw-0 fFONwU csKyZk">© <!-- -->2024<!-- --> Okta, Inc. All Rights Reserved.</p></section></footer></div><div id="asset-library-root"></div><iframe id="drift-iframe" src="https://drift.app.auth0.com/drift-iframe" title="Drift iframe" style="width:0;height:0;border:none;position:absolute"></iframe><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-W7FRLJ" height="0" width="0" style="display:none;visibility:hidden" title="gtm"></iframe></noscript></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":[{"type":"webinars","updatedAt":"2023-06-14T19:13:08.651Z","title":"Identity-first for truly personalised retail experiences","id":"identity-first-for-truly-personalised-retail-experiences","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5AL9ilnSatCnliLuUSCVon","type":"Asset","createdAt":"2023-06-14T16:59:18.977Z","updatedAt":"2023-06-14T17:00:05.936Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Identity-first for truly personalised retail experiences","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5AL9ilnSatCnliLuUSCVon/55ae4d2728371fee966b2b7798ef606d/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":90012,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Identity-first for truly personalised retail experiences\n\nIn this webinar we would like to show you - using concrete (code) examples:\n\n- How the wide variety of your users digital identities can be combined into a unified profile\n- How you can use this 360° view of your customer to create a personalised user experience\n- How you can link this personalised online experience with the in-store experiences to holistically - “omnichannel” - serve your customer\n\nWith plenty of practical examples and best practices, this webinar will teach you how to pull together loose threads and put your customer first. Through the broad range of out-of-the-box capabilities of our solution, we want to show you how to focus on what matters most: Creating the best possible user experience for your customers without being held back by your technical infrastructure!\n\n![Felix-Colaci](//images.ctfassets.net/2ntc334xpx65/7qwUV7OkpsHKDALRCMiBku/c72276cd0f8d302b8199de9d8cc5432c/Felix-Colaci.jpg)\nFelix Colaci | CIAM Specialist\n\n![andré-hochstein](//images.ctfassets.net/2ntc334xpx65/4YpmJ9pgoYs1CRyFxKHKtg/816d806c477269191bc70865d393f974/andre__-hochstein.jpg)\nAndré Hochstein | Solutions Architect","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1SQV1VYMSCue3fBLfhQvaV","type":"Asset","createdAt":"2023-06-14T16:59:44.745Z","updatedAt":"2023-06-14T16:59:44.745Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity-first for truly personalised retail experiences","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1SQV1VYMSCue3fBLfhQvaV/bda7eb76cad5d318524a22ea13320aff/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":760614,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3l1q2hxl36tXhpC4VKBxUq","type":"Asset","createdAt":"2023-06-14T16:46:58.853Z","updatedAt":"2023-06-14T16:46:58.853Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Identity-first for truly personalised retail experiences","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3l1q2hxl36tXhpC4VKBxUq/f4dfe07aa17df89d488a769bd1c31e0a/Identity-first_for_truly_personalised_retail_experiences.mp4","details":{"size":70829928},"fileName":"Identity-first for truly personalised retail experiences.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001t857AAA-aPA4z000000TNG0GAO"},{"type":"webinars","updatedAt":"2022-09-10T21:12:58.321Z","title":"How Headspace Scaled Identity and Minimized Security Risk","id":"headspace-aws-auth0-security","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1YHUs0QNRdhg0jV2dSYkAg","type":"Asset","createdAt":"2021-06-23T21:41:09.044Z","updatedAt":"2021-06-24T17:01:43.928Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"How Headspace Scaled Identity and Minimized Security Risk","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1YHUs0QNRdhg0jV2dSYkAg/0c2dee37eb63c0dffe3199d9166fd49a/Headspace_Webinar_Cover_Image.jpeg","details":{"size":162777,"image":{"width":600,"height":856}},"fileName":"Headspace Webinar Cover Image.jpeg","contentType":"image/jpeg"}}},"description":"## Delivering security and mindfulness at scale\nHeadspace’s mission is to improve the health and happiness of the world by providing guided meditations and mindfulness content through its mobile application. The company sought out a scalable and secure identity solution to support its millions of monthly active users and accommodate continued growth. Additionally, it needed to support its enterprise customers who were including Headspace services in their employee benefits packages.\n\nWith Amazon Web Services (AWS) and AWS Partner Auth0, Headspace was able to achieve both. In this webinar, hear how to implement a frictionless digital experience with authentication and authorization as a service.\n\n## Watch this webinar, and see how to:\n- Focus on innovation instead of building and maintaining identity solutions\n- Incorporate identity into any customer-facing application quickly, securely, and at scale\n- Enable secure identity and access management across your environments","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"28LsSDl4FIPsB8JPgoydBm","type":"Asset","createdAt":"2021-06-23T21:41:37.077Z","updatedAt":"2021-06-23T21:41:37.077Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How Headspace Scaled Identity and Minimized Security Risk","file":{"url":"//images.ctfassets.net/2ntc334xpx65/28LsSDl4FIPsB8JPgoydBm/34145c8cd5c3cd82da098a2e06722b89/Headspace_Webinar_Share_Asset.png","details":{"size":2136677,"image":{"width":5000,"height":2432}},"fileName":"Headspace Webinar Share Asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"52YozcVaoaHCSvfbJ8ac3k","type":"Asset","createdAt":"2021-06-24T17:01:04.882Z","updatedAt":"2021-06-24T17:01:04.882Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How Headspace Scaled Identity and Minimized Security Risk","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/52YozcVaoaHCSvfbJ8ac3k/b33a04033084955408a4fc7cc5e99494/How-Headspace-Scaled-Identity-and-Minimized-Security-Risk-webinar.mp4","details":{"size":340866291},"fileName":"How-Headspace-Scaled-Identity-and-Minimized-Security-Risk-webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","ocid":"7014z000001cb5dAAA-aPA4z000000013gGAA"},{"type":"webinars","updatedAt":"2022-09-10T20:59:03.179Z","title":" Build or Buy a Customer Identity Platform?","id":"build-or-buy-a-customer-identity-platform","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1vni3Zd81ewnohLXgfmUAH","type":"Asset","createdAt":"2020-03-17T18:12:54.253Z","updatedAt":"2020-03-17T18:12:54.253Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Live from Australia] Build or Buy your Customer Identity Platform","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1vni3Zd81ewnohLXgfmUAH/bee7e23854ee7d053261151b3c46a79a/_Live_from_Australia__Build_or_Buy_your_Customer_Identity_Platform.png","details":{"size":296196,"image":{"width":600,"height":856}},"fileName":"[Live from Australia] Build or Buy your Customer Identity Platform.png","contentType":"image/png"}}},"description":"In this webinar, John Crespo, Solution Engineer at Auth0, will discuss the journey from building multiple individual login forms for each app, to buying an identity platform to support all your needs, complemented by an Auth0 live demo. \n\nIn this webinar you’ll learn about:\n- Why Identity Management is a key factor in business\n- The pros and cons of building vs. buying a customer identity platform\n- The total cost of ownership of both possible solutions \n- Examples of what a customer identity platform should be able to support\n- What the Auth0 Solution looks like and how it supports these requirements ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7Ewgjyjn98uuOYTT8uTk3H","type":"Asset","createdAt":"2020-02-18T23:45:52.062Z","updatedAt":"2020-02-18T23:47:11.695Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":3,"locale":"en-US"},"fields":{"title":"buil_vs_buy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7Ewgjyjn98uuOYTT8uTk3H/8737631f52bee0330a813bd026b89882/Twitter_Card_APAC_Q1_Webinar.jpeg","details":{"size":191110,"image":{"width":2400,"height":1260}},"fileName":"Twitter Card_APAC Q1 Webinar.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"8jsQtuFJmh6jKOX7F1aP8","type":"Asset","createdAt":"2020-03-11T16:14:52.781Z","updatedAt":"2020-03-11T16:14:52.781Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"locale":"en-US"},"fields":{"title":"build_or_buy","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/8jsQtuFJmh6jKOX7F1aP8/3508ef4ccbd5cba0953229d0fe8d4bd2/Build_or_Buy_a_Customer_Identity_Platform_.mp4","details":{"size":69084120},"fileName":"Build or Buy a Customer Identity Platform_.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2QlOgMO4xTa89hP8bIBdId","type":"Asset","createdAt":"2020-09-30T21:04:12.474Z","updatedAt":"2020-09-30T21:04:12.474Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Build or Buy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2QlOgMO4xTa89hP8bIBdId/ebde57c7d238e8dbb034329702f90de8/resource_thumb_70.jpg","details":{"size":67540,"image":{"width":581,"height":388}},"fileName":"resource_thumb_70.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb2XAAQ-aPA4z000000011sGAA"},{"type":"webinars","updatedAt":"2022-09-10T14:49:09.660Z","title":"Customer Identity Innovation: Journey to Loginless \u0026 Reducing Friction","id":"customer-identity-innovation-the-journey-to-loginless-and-reducing-friction","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lV9Ips5E4I4bq6hPtvS67","type":"Asset","createdAt":"2022-08-05T21:05:21.139Z","updatedAt":"2022-08-05T21:08:39.239Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Customer Identity Innovation: Journey to Loginless \u0026 Reducing Friction","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lV9Ips5E4I4bq6hPtvS67/17c39bdbe7118001338ec78df304c52a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":90024,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Auth0 explores the new age of identity authorisation technologies and strategies that will look at securing and optimizing your customer experience and service cost maintenance and data in a Fireside chat with Mindvalley.\n\nKey Discussion Topics: \n\n1. Reducing the customer friction: the challenge of customer identity and removing complexity.\n2. Assessing some of the challenges organisations face in delivering frictionless service: cyber-threats, multi-applications, and legacy approaches.\n3. How to leverage a “loginless” environment in order to enhance personalisation.\n4. Local use-cases around “loginless” adoption and how you can build a blueprint.\n\nSpeakers: \n- Richard Marr, APAC CIAM Lead, Auth0\n- John Wong, Principal Architect, Mindvalley\n- Matthew Egan, Editorial Director, Innovatus Media\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"35MHDOXp6ZI5kNsp7uTqkd","type":"Asset","createdAt":"2022-08-05T21:05:41.351Z","updatedAt":"2022-08-05T21:05:41.351Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Customer Identity Innovation: Journey to Loginless \u0026 Reducing Friction","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/35MHDOXp6ZI5kNsp7uTqkd/e021bf3fa4683035a8b92cac2df92bd6/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":751241,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1GENnrKOPXTpxGmQw2b4JZ","type":"Asset","createdAt":"2022-08-05T20:46:31.897Z","updatedAt":"2022-08-05T20:46:31.897Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Customer Identity Innovation: The Journey to Loginless and Reducing Friction","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1GENnrKOPXTpxGmQw2b4JZ/52dc11739d2817bf6adad4bd0ade5d44/Customer_Identity_Innovation_The_Journey_to_Loginless_and_Reducing_Friction.mp4","details":{"size":380929014},"fileName":"Customer Identity Innovation The Journey to Loginless and Reducing Friction.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cbbNAAQ-aPA4z0000008OZiGAM"},{"type":"webinars","updatedAt":"2022-09-10T14:47:43.913Z","title":"Auth0 Kickstart Workshop: South East Asia Edition","id":"kickstart-workshop-south-east-asia-edition","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6jCtToL9cxPY0DlbdMqtFL","type":"Asset","createdAt":"2022-06-17T15:53:48.852Z","updatedAt":"2022-06-17T16:03:21.026Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 Kickstart Workshop: South East Asia Edition","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6jCtToL9cxPY0DlbdMqtFL/98cb554f82e7640a36f1396e0a6eff68/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":161075,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"You’ll learn how the Auth0 identity platform can help you and your team to easily implement frictionless digital experience with enhanced identity protection. This free workshop includes demos, hands-on exercise and Q\u0026A time. \n\nBy the end of the session, you will have a good appreciation of the Auth0 Identity Platform and how this technology can help modernise your technology architecture while having the flexibility to “custom-tailor” great and secure digital experience for your users.\n\nAgenda:\n\n__Introduction to Auth0__\n\nDiscover the basics of Auth0: how it’s used for existing or new web/mobile applications and how to easily enable an unique login experience. Learn how to add authentication and social login to web applications. Learn how to customise branding for your businesses.\n\n__Integrations \u0026 Extensions__\n\nCustomise and extend user identity management by integrating Auth0 with your applications, including Salesforce, Marketo, web services to external databases, you name it. \n\n__Simple and Secure Identity__\n\nFrom MFA to bot detection, security and great customer experiences no longer need to be mutually exclusive.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1iU5ZF743Ekhm1F6CW6dfg","type":"Asset","createdAt":"2022-06-17T15:54:48.753Z","updatedAt":"2022-06-17T15:54:48.753Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Kickstart Workshop: South East Asia Edition","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1iU5ZF743Ekhm1F6CW6dfg/a6557ee6685e2e9826afe6330d8f5804/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":895076,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3yC38Tg1kbMKTwll340PoZ","type":"Asset","createdAt":"2022-06-17T15:22:11.767Z","updatedAt":"2022-06-17T15:22:11.767Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Kickstart Workshop: South East Asia Edition","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3yC38Tg1kbMKTwll340PoZ/1fd354e12e764721b1d8361593bcb5fe/Auth0_Kickstart_Workshop_South_East_Asia_Edition.mp4","details":{"size":236018757},"fileName":"Auth0 Kickstart Workshop South East Asia Edition.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb8qAAA-aPA4z000000017gGAA"},{"type":"webinars","updatedAt":"2022-09-10T14:47:27.499Z","title":"Identity Proofing with Auth0 Partner Integrations","id":"identity-proofing-partner-integrations-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"42P6k7kBzMzY0sdWoHS05l","type":"Asset","createdAt":"2022-06-16T18:48:34.875Z","updatedAt":"2022-06-16T18:48:34.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Proofing with Auth0 Partner Integrations","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/42P6k7kBzMzY0sdWoHS05l/9ba4c35e1096d9def2aaca7d7579213c/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":89296,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Identity proofing, the process of verifying a user’s identity, is a critical piece of the security infrastructure. Acting as an additional layer of authentication, identity proofing happens before a user is granted access to resources with high sensitivity, and is used to ensure a user’s claimed identity matches their actual identity.\n\nBecause of the complexity around identity proofing methods, many organizations have struggled to build and manage an in-house solution. By recruiting identity proofing experts via Auth0 Marketplace, we’re enabling our customers to implement no-code, identity proofing integrations into their applications without the heavy lift of custom code. These integrations are built through our Auth0 Actions extensibility toolset.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"49OUrwhO7HeZvIURdQD5Rr","type":"Asset","createdAt":"2022-06-16T18:42:09.920Z","updatedAt":"2022-06-16T18:42:09.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"-Share Asset- Webinar (Horizontal)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/49OUrwhO7HeZvIURdQD5Rr/3473bb1383dffb9c688b6ab30e7ae1c8/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":846672,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1Bj4x9vQhH3BeU7AfBy8Ls","type":"Asset","createdAt":"2022-06-16T18:47:33.349Z","updatedAt":"2022-06-16T18:47:33.349Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Proofing with Auth0 Partner Integrations","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1Bj4x9vQhH3BeU7AfBy8Ls/a4004e75c8f2e5fdb5bf055f5576cf2c/Identity_Proofing_with_Auth0_Partner_Integrations_Webinar.mp4","details":{"size":158660387},"fileName":"Identity Proofing with Auth0 Partner Integrations Webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb8pAAA-aPA4z000000017fGAA"},{"type":"webinars","updatedAt":"2022-09-10T14:42:47.190Z","title":"The Journey to Loginless. First Step, Passwordless.","id":"on-demand-passwordless-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7tmc2BOoqEeWfCXkX8SP31","type":"Asset","createdAt":"2022-04-07T00:09:40.142Z","updatedAt":"2022-04-07T00:09:40.142Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"The Journey to Loginless. First Step, Passwordless.","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7tmc2BOoqEeWfCXkX8SP31/607c505e85bd098fb3cb214fe854dd33/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":97000,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Identity sits at the intersection of convenience, privacy, and security. From improving customer experiences, to ensuring secure authentication flows that protect customer data - today’s login box must find the right balance between user convenience, security, and privacy. \n\nWe believe that the companies that will succeed in the next five years will be the ones best-equipped to balance the ever-growing customer expectations of these attributes One of the key changes on the horizon that will impact these attributes is loginless authentication.\n\nIn the near future, traditional logins will no longer be the dominant form of access. Today’s ubiquitous login boxes, with their user ID and password fields, will be replaced with user-centric systems that favor convenience (without sacrificing security or privacy) and that are built on trust.\n\nHowever, this journey to loginless can be fraught with complications, unknowns, and misconceptions. Watch this webinar to discuss and explore:\n- The most common misconceptions when it comes to authentication and loginless\n- How you can prepare your business today for the loginless future of tomorrow","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5wrXe9G2EjqkUq9wEFsVRk","type":"Asset","createdAt":"2022-04-07T16:05:57.242Z","updatedAt":"2022-04-07T16:05:57.242Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"The Journey to Loginless. First Step, Passwordless.","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5wrXe9G2EjqkUq9wEFsVRk/3de056e0b8186915f6d1df01b0b1279b/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":108005,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2DwzxMgzPEsxOSstNwFniY","type":"Asset","createdAt":"2022-04-07T16:05:33.513Z","updatedAt":"2022-04-07T16:05:33.513Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"The Journey to Loginless. First Step, Passwordless","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/2DwzxMgzPEsxOSstNwFniY/51a0fff89ffc44accc86fe51cd9cfaeb/The_Journey_to_Loginless._First_Step__Passwordless.mp4","details":{"size":110616899},"fileName":"The Journey to Loginless. First Step, Passwordless.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cbbBAAQ-aPA4z0000008OZaGAM"},{"type":"webinars","updatedAt":"2022-09-09T03:13:03.368Z","title":"The Future of Authentication for Employees and Customers","id":"the-future-of-authentication-with-jameeka","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"oEClOoc2MsIVXjswfVROI","type":"Asset","createdAt":"2022-03-31T00:12:44.159Z","updatedAt":"2022-03-31T00:15:21.109Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"The Future of Authentication for Employees and Customers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/oEClOoc2MsIVXjswfVROI/39dd160e933a483a86b26518c28d0711/-Google_Docs-_Future_of_Authentication_hi.jpeg","details":{"size":141334,"image":{"width":600,"height":856}},"fileName":"-Google Docs- Future of Authentication hi.jpeg","contentType":"image/jpeg"}}},"description":"### Presented by Auth0 CISO Jameeka Aaron\n\nA strong customer identity foundation should empower businesses with simple, secure, and adaptable identity platforms to fit their unique needs while creating a seamless experience for employees and customers. Identity is much more than logging-in and signing-up; it provides a way to connect with the people who matter most to your brand, to establish trust, and increase conversion opportunities. \n\nWatch this webinar now to discover ways to balance security with friction and to create a safe authentication experience without compromising on privacy.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5tIWdt46viJ4b5OwIifKlq","type":"Asset","createdAt":"2022-03-31T00:14:48.499Z","updatedAt":"2022-03-31T00:14:48.499Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Authentication for Employees and Customers","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5tIWdt46viJ4b5OwIifKlq/7e4214215babdddbac951a51b2d79e9a/-Share_Asset-_Future_of_Authentication.jpeg","details":{"size":113126,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Future of Authentication.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6oUnVEnENixldKVs49AIOr","type":"Asset","createdAt":"2022-03-31T00:02:24.990Z","updatedAt":"2022-03-31T00:02:24.990Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Authentication for Employees and Customers (Presented by Auth0 CISO Jameeka Aaron)","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6oUnVEnENixldKVs49AIOr/880788fda064b78e48a7f9a6537bf149/Okta_Identity___Access_Recording.mp4","details":{"size":107602911},"fileName":"Okta Identity \u0026 Access Recording.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cbbAAAQ-aPA4z0000008OZYGA2"},{"type":"webinars","updatedAt":"2022-09-09T03:13:02.746Z","title":"Understand Evolving Data Privacy for CIAM","id":"understanding-data-privacy-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ERvqf6PpBac2jTLWUM7mz","type":"Asset","createdAt":"2022-03-23T15:23:48.922Z","updatedAt":"2022-03-23T15:26:12.919Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Understand Evolving Data Privacy for CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/ERvqf6PpBac2jTLWUM7mz/6c563278d6393e487b0fb9e3195436d1/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":87253,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Data privacy laws, such as GDPR and CCPA, are in constant flux and are fundamentally rewriting the rules for how organisations collect, store, and share personal data. Meeting these legal obligations means managing both how you architect and approach Customer Identity and Access Management for your organisation.\n\nCustomers wanting a secure trustworthy experience is adding to the pressure from regulators to remain compliant and place data privacy at the centre of your application design. A CIAM solution needs to provide all of these elements, as well as tailoring data collection and consent management practices to the relevant law.\n\nJoin this 30 minute webinar for a crash course in data privacy for CIAM for the busy developer, including:\n- Privacy Vs Security Vs User Experience - Understand the impact of regulations\n- Managing user consent and customer data\n- How to architect your CIAM application","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vNldlOo3C3tsTiRz38QEp","type":"Asset","createdAt":"2022-03-23T15:24:37.009Z","updatedAt":"2022-03-23T15:24:37.009Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Understand Evolving Data Privacy for CIAM","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6vNldlOo3C3tsTiRz38QEp/54716d915ff4f0c0fa086b4d44388c7d/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":735036,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"AUeRNW0ednL2x1GeQoLGO","type":"Asset","createdAt":"2022-03-23T15:21:22.068Z","updatedAt":"2022-03-23T15:21:22.068Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Understand Evolving Data Privacy for CIAM","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/AUeRNW0ednL2x1GeQoLGO/629eaee8376ae6e18a8b23871c8bd015/Understand_Evolving_Data_Privacy_for_CIAM.mp4","details":{"size":55084308},"fileName":"Understand Evolving Data Privacy for CIAM.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cbavAAA-aPA4z0000008OZXGA2"},{"type":"webinars","updatedAt":"2022-09-09T03:12:58.749Z","title":"Elevate trusted digital identity solutions through eIDs","id":"trusted-identity-solutions-eids","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7mA5EOgBojaa3p4y1Opt2l","type":"Asset","createdAt":"2022-01-18T16:58:08.871Z","updatedAt":"2022-01-18T16:59:10.987Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Elevate trusted digital identity solutions through eIDs","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7mA5EOgBojaa3p4y1Opt2l/4c640c1f39de941f7d367590174c2a4c/Elevate_trusted_digital_identity_solutions_through_eIDs_-_Cover.jpeg","details":{"size":103508,"image":{"width":600,"height":856}},"fileName":"Elevate trusted digital identity solutions through eIDs - Cover.jpeg","contentType":"image/jpeg"}}},"description":"Auth0 and [Signicat](http://www.signicat.com/) have integrated services, enabling Auth0 customers to onboard and authenticate users through third-party electronic identity (eID) integrations on Signicat’s Digital Identity Platform. As usage of digital identity solutions increases, the partnership makes it easy for companies to give their customers a convenient way to access services with an ID they already know and trust.\n\nSignicat is present via the [Auth0 Marketplace](https://marketplace.auth0.com/) through two solutions: Signicat Express and Signicat Enterprise.The off-the-shelf solutions require little to no configuration, where businesses can easily manage and choose between a range of European eID methods.\n\nWatch to learn more about:\n\n- How your business can reach a large addressable market through 30+ national eID schemes\n- Why users prefer eIDs to other authentication methods\n- Why Signicat’s authentication solutions are unique on the Auth0 Marketplace\n- For which use cases customers should chose the eID solutions\n- What other services Signicat and Auth0 offer for secure customer authentication\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3BuB6ZxhzUpolgZ6ZmexX5","type":"Asset","createdAt":"2022-01-18T16:51:07.294Z","updatedAt":"2022-01-18T16:51:07.294Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Elevate trusted digital identity solutions through eIDs","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3BuB6ZxhzUpolgZ6ZmexX5/a73de843676240ac9f75b22c4d99a3ca/Elevate_trusted_digital_identity_solutions_through_eIDs_-_Share_Asset.png","details":{"size":305598,"image":{"width":1250,"height":608}},"fileName":"Elevate trusted digital identity solutions through eIDs - Share Asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"vaGD5GJbqH3yuibhWSvXp","type":"Asset","createdAt":"2022-01-18T16:44:37.105Z","updatedAt":"2022-01-18T16:44:37.105Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Elevate trusted digital identity solutions through eIDs","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/vaGD5GJbqH3yuibhWSvXp/dd4976e754168f7ae1795f653505bbda/Elevate_trusted_digital_identity_solutions_through_eIDs.mp4","details":{"size":255610605},"fileName":"Elevate trusted digital identity solutions through eIDs.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb7XAAQ-aPA4z000000015YGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:56.975Z","title":"Auth0 and AWS Immersion Day: Securing modern, multi-SaaS applications","id":"aws-securing-modern-multi-saas-applications","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5LAwTpa9DdqVlGXcFPmo8b","type":"Asset","createdAt":"2021-12-01T15:36:26.586Z","updatedAt":"2021-12-01T15:37:51.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 and AWS: Securing modern, multi-SaaS applications","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5LAwTpa9DdqVlGXcFPmo8b/59ff1e24f72afe744f14680118c5feaf/Auth0_and_AWS_Immersion_Day_-_Securing_modern__multi-SaaS_applications__Thumbnail_.jpeg","details":{"size":107443,"image":{"width":600,"height":856}},"fileName":"Auth0 and AWS Immersion Day - Securing modern, multi-SaaS applications (Thumbnail).jpeg","contentType":"image/jpeg"}}},"description":"As customers adopt more digital solutions, the need for scalable and accessible applications grows into every aspect of the business. But what makes for a great business case is actually a huge challenge for everyone trying to implement such solutions. Creating a unified platform to logically separate customer data whilst enabling collaboration between them all present engineering tasks which implementation can decide over the success or failure of a platform.\n\nThrough best practice presentations and hands-on labs, you will learn how to build a scalable and secure user management platform based on Auth0 and integrated into your existing AWS environment.\n\nThe workshop will cover:\n- How to easily add user security to any application through Auth0\n- Multi-Tenant app challenges and Best Practices\n- How to manage multiple customers with a centralized user directory\n- Enabling access across application instances\n- Managing user metadata and access through the login process","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3rR2MdyXN3E9WzwCfE9EZj","type":"Asset","createdAt":"2021-12-01T15:37:01.327Z","updatedAt":"2021-12-01T15:37:01.327Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 and AWS: Securing modern, multi-SaaS applications","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3rR2MdyXN3E9WzwCfE9EZj/51897a3db42989aaa4f57440a218bb32/Auth0_and_AWS_Immersion_Day_-_Securing_modern__multi-SaaS_applications__Share_Asset_.png","details":{"size":403183,"image":{"width":1250,"height":608}},"fileName":"Auth0 and AWS Immersion Day - Securing modern, multi-SaaS applications (Share Asset).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"dfRkwKKgW6DiOT1KkbGRf","type":"Asset","createdAt":"2021-12-01T15:22:21.689Z","updatedAt":"2021-12-01T15:22:21.689Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 and AWS Immersion Day: Securing modern, multi-SaaS applications","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/dfRkwKKgW6DiOT1KkbGRf/6174c3821201213662d4ee109f4d3003/AWS_EMEA_Immersion_Day_-_November_2021.mp4","details":{"size":216010548},"fileName":"AWS EMEA Immersion Day - November 2021.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cbAqAAI-aPA4z0000000149GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:56.316Z","title":"Why Build When You Can Buy: A Fireside Chat with YourStory","id":"fireside-chat-with-your-story","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"25JQyqRLKD4xcgX8gddr1M","type":"Asset","createdAt":"2021-12-10T22:36:35.297Z","updatedAt":"2021-12-10T22:36:35.297Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Why Build When You Can Buy: A Fireside Chat with YourStory","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/25JQyqRLKD4xcgX8gddr1M/d96cd781174a3f2ac885cff9060919cc/-Landing_Page-_Gated_Content__any___625x892px___6_.jpeg","details":{"size":103488,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (6).jpeg","contentType":"image/jpeg"}}},"description":"Identity management is like opening the gates to your digital applications. If it becomes too easy or difficult for the wrong person to open, it would impact your customer experience (CX) and security. The Auth0 Identity Platform, a product unit within Okta, is an authorisation and authentication platform for the developers/businesses that acts as a service for custom apps, generally termed as Identity.\n\n__Why build when you can buy__\nSometimes, it can be difficult and frustrating for developers/businesses in using their developmental platforms to build something internally that might feel like a waste of time, engineering efforts, and resources. Mid-year surveys conducted by some platforms identified that developers had custom app monolithic legacy infrastructure, instead of the micro-services (modern). Now, as the story goes, micro-services (modern) work smoothly, when compared to the former.\n\n__Busting myths__\nIt’s a common myth that it's cheaper to build and manage, instead of leveraging a SaaS. However, the reality states it to be a solved problem that doesn’t need to be built anymore, and the total cost of ownership (TCO) would be lowered while considering the best developers focusing on innovation instead of building identity.\n\nThis on-demand version of the webinar, “Why build when you can buy” is designed to address identity and authentication as the foundation for providing access to digital services.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6VO4UiMO7oYhy0Qw8qcxbX","type":"Asset","createdAt":"2021-12-10T22:36:53.556Z","updatedAt":"2021-12-10T22:36:53.556Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Why Build When You Can Buy: A Fireside Chat with YourStory","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6VO4UiMO7oYhy0Qw8qcxbX/69c0a5bac6c437febca3d65939c0d304/-Share_Asset-_Webinar__Horizontal___5_.jpeg","details":{"size":113171,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Webinar (Horizontal) (5).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1bvtilSz5FC04NmBdeW5Rw","type":"Asset","createdAt":"2021-12-10T22:41:23.669Z","updatedAt":"2021-12-10T22:41:23.669Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Why Build When You Can Buy: A Fireside Chat with YourStory","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1bvtilSz5FC04NmBdeW5Rw/e59157616525d6ed24ab0eac0f53e304/Auth0-YourStory-Customer-Fireside-Chat.mp4","details":{"size":275288619},"fileName":"Auth0-YourStory-Customer-Fireside-Chat.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cb79AAA-aPA4z000000015NGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:54.341Z","title":"Auth0 for Consumer-Facing Applications","id":"demo-consumer-facing-applications","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2q2lLkA1WwycuQqcCOqeOc","type":"Asset","createdAt":"2018-12-17T19:24:18.016Z","updatedAt":"2019-11-06T11:21:11.215Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0 for Consumer-Facing Applications@1x","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2q2lLkA1WwycuQqcCOqeOc/84ac7b1e9dfe65d56986bb46f28b18d6/Auth0_for_Consumer-Facing_Applications_1x.png","details":{"size":503953,"image":{"width":600,"height":856}},"fileName":"Auth0 for Consumer-Facing Applications@1x.png","contentType":"image/png"}}},"description":"This webinar is not just for the demo-lovers out there. It’s for Product, Marketing and IAM Managers who care about streamlining login to consumer applications and gaining a single view into a user’s profile and data. It’s for those Compliance and Security folks who want to understand what it looks like to provide automated security behind the scenes of the login screen with Auth0, and also for those Architects and Engineering managers who want to know what it looks like to integrate Auth0 with other marketing tools. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"44i7Lvi5mMI0igYqaSo022","type":"Asset","createdAt":"2018-12-17T19:25:03.557Z","updatedAt":"2019-11-06T11:21:10.682Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"TC Live Webinar Story (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/44i7Lvi5mMI0igYqaSo022/07ba6875e1af911dba98e973ed590aa8/TC_Live_Webinar_Story__2_.png","details":{"size":1456238,"image":{"width":2400,"height":1260}},"fileName":"TC_Live_Webinar_Story (2).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2qTIWxTnYcgQ0sYgwIyyk4","type":"Asset","createdAt":"2018-12-17T16:05:08.063Z","updatedAt":"2019-11-06T11:41:44.722Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Live Demo Auth0 for Consumer-Facing Applications","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/2qTIWxTnYcgQ0sYgwIyyk4/4465b99280bcaf6ae2b4648f5727852a/Live_Demo__Auth0_for_Consumer-Facing_Applications.mp4","details":{"size":75508128},"fileName":"Live Demo_ Auth0 for Consumer-Facing Applications.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vscPECLtZrMUo86gTT2hU","type":"Asset","createdAt":"2020-09-30T20:46:43.420Z","updatedAt":"2020-09-30T20:46:43.420Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Consumer-Facing Applications","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6vscPECLtZrMUo86gTT2hU/0ab5731c3d9e870c295b1ef60d5ed1ed/resource_thumb_65.jpg","details":{"size":78139,"image":{"width":581,"height":388}},"fileName":"resource_thumb_65.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb19AAA-aPA4z0000000114GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:52.719Z","title":"Top Trends and Themes Shaping the IAM Market","id":"top-trends-and-themes-shaping-the-iam-market","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6MSqRZ2h5oMXqeT1awqdIk","type":"Asset","createdAt":"2019-08-23T20:30:32.997Z","updatedAt":"2019-11-06T11:20:40.697Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":2,"locale":"en-US"},"fields":{"title":"Top Trends and Themes Shaping the IAM Market Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6MSqRZ2h5oMXqeT1awqdIk/b61cd4d0339849edd8eb1c434d84cdc4/Top_Trends_and_Themes_Shaping_the_IAM_Market_2x__1_.png","details":{"size":93496,"image":{"width":600,"height":856}},"fileName":"Top Trends and Themes Shaping the IAM Market@2x (1).png","contentType":"image/png"}}},"description":"Identity and access management (IAM) capabilities are critical in the fight to protect customers from data breaches, account takeover, credential stuffing, identity theft, and privacy abuses, to name a few. \n\nBusiness leaders, CIOs, CTOs, and CISOs no longer have to sacrifice privacy or user experience for security, or vice versa, and now use IAM technologies to both improve engagement with their business customers and end users and protect them throughout their journey. With growing compliance requirements, increasing amount of data breaches and the ubiquitous demand for optimal user experience, organizations increasingly struggle to build a strategy for managing their user’s identity in a holistic and easily manageable fashion.\n\nIn this webinar, Merritt Maxim, VP \u0026 Research Director at Forrester Research will provide perspectives on key market trends shaping the general IAM market for any audience, and leading indicators that are driving innovative technologies. Maxim will provide guidance on how organizations are addressing growing identity requirements that satisfy security and UX demands, and implementing identity in a way that will scale for any and all growth. \n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3v6ftQ3qsyh0wJ2eJAmcbx","type":"Asset","createdAt":"2019-08-23T16:56:37.490Z","updatedAt":"2019-11-06T11:20:41.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"TC Top Trends and Themes","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3v6ftQ3qsyh0wJ2eJAmcbx/a9a2656eabf0d509004466c00933defd/TC_Introduccio_n_a_Modern_Identity.png","details":{"size":168544,"image":{"width":2400,"height":1260}},"fileName":"TC_Introducción a Modern Identity.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6q2cXz9z1P9HWu8Q383jif","type":"Asset","createdAt":"2019-08-23T20:16:00.401Z","updatedAt":"2019-11-06T11:41:41.511Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":4,"locale":"en-US"},"fields":{"title":"Forrester Top Trends and Themes","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6q2cXz9z1P9HWu8Q383jif/5ee37899ae341db766f72db27e4f7e75/Forrester__NEW_VERSION_mp4_.mp4","details":{"size":510854694},"fileName":"Forrester (NEW VERSION mp4).mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lEwDnPTTtqLTCw6AvFXfF","type":"Asset","createdAt":"2020-09-30T20:54:45.005Z","updatedAt":"2020-09-30T20:57:36.993Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"IAM Market","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lEwDnPTTtqLTCw6AvFXfF/eba8bb891d9a6521e899af23df5824f7/resource_thumb_23.jpg","details":{"size":56154,"image":{"width":581,"height":388}},"fileName":"resource_thumb_23.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb1qAAA-aPA4z000000011TGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:52.428Z","title":"Modern Authentication Demystified","id":"modern-authentication-demystified","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3YTaejHnYo7RsTmjnHS6sR","type":"Asset","createdAt":"2019-05-01T13:32:18.936Z","updatedAt":"2019-11-06T11:20:57.996Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Modern Authentication Demystified CP","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3YTaejHnYo7RsTmjnHS6sR/951f557463031b57310981d6275d7095/Modern_Authentication_Demystified_CP.png","details":{"size":321037,"image":{"width":600,"height":856}},"fileName":"Modern Authentication Demystified CP.png","contentType":"image/png"}}},"description":"JSON Web Tokens, Open ID, Authentication Flows, __*Oh My!*__ \n\nFrom web applications to APIs, desktop to mobile apps, and everything in between, there has never been a better or more complex time to write code. When it comes to securing various types of applications you may be wondering about the right approach - with each new architecture, the rules of security get rewritten... \n\nIn this webinar, full-stack developer, advocate, and evangelist at Auth0, __Ado Kukic__ will demystify common security patterns for various types of modern app architectures.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"HAnztPn7440l2KjWrLRHx","type":"Asset","createdAt":"2019-04-10T13:43:43.990Z","updatedAt":"2019-11-06T11:20:58.514Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Modern Authentication Demystified TC","file":{"url":"//images.ctfassets.net/2ntc334xpx65/HAnztPn7440l2KjWrLRHx/050227b1241e03dbe807a07b363d135a/Modern_Authentication_Demystified_TC.png","details":{"size":1127855,"image":{"width":2400,"height":1260}},"fileName":"Modern Authentication Demystified TC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"58EF02DMi7g7MmfdW86pae","type":"Asset","createdAt":"2019-05-01T13:33:22.985Z","updatedAt":"2019-11-06T11:41:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"Modern Authentication Demystified","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/58EF02DMi7g7MmfdW86pae/e24609566a25921060eaa9146e4360f6/Modern_Authentication_Demystified.mp4","details":{"size":40035741},"fileName":"Modern Authentication Demystified.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HZnWsf8N15kX4QrP603Mh","type":"Asset","createdAt":"2020-09-29T18:20:36.745Z","updatedAt":"2020-09-29T18:20:36.746Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM technology","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HZnWsf8N15kX4QrP603Mh/bd169c65ae3684f45fbdd4c04072c342/resource_thumb_5.jpg","details":{"size":43394,"image":{"width":581,"height":388}},"fileName":"resource_thumb_5.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb1EAAQ-aPA4z0000000119GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:48.641Z","title":"Identity in Southeast Asia with NTUC","id":"identity-in-southeast-asia-with-ntuc","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"281R7DFu2bKIx8LdRo5k4V","type":"Asset","createdAt":"2021-11-17T23:07:46.813Z","updatedAt":"2021-11-17T23:07:46.813Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Identity in Southeast Asia with NTUC","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/281R7DFu2bKIx8LdRo5k4V/94f6e72730c115769bffdccb8a81fa93/-Landing_Page-_Gated_Content__any___625x892px___1_.jpeg","details":{"size":90681,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px) (1).jpeg","contentType":"image/jpeg"}}},"description":"Join us for this on-demand version of our event with NTUC Enterprise Digital’s VP, Wilson Lim, Product Development. Wilson shares how NTUC have tackled issues like:\n- Frustration with outbound/inbound campaigns not delivering expected results due to duplicate customer profiles; \n- Embarassment over poor customer experience due to high-friction sign-up, login, and password reset flow; \n- Suffering from the high cost of building and maintaining multiple identity services across multiple brands; \n- Worries about the data breaches and identity theft. \n\nLearn how NTUC Enterprise Digital and Auth0:\n- Built a single customer view across their brands/subsidiaries; \n- Migrated from a legacy in-house developed multiple identity services to centralised identity service; \n- Improved Security features without compromising customer experience; \n- Adopted a centralised customer identity service for multiple brands/subsidiaries ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2CBlOF9nwvnFByiaZUD3Vj","type":"Asset","createdAt":"2021-11-17T23:16:49.473Z","updatedAt":"2021-11-17T23:16:49.473Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity in Southeast Asia with NTUC","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2CBlOF9nwvnFByiaZUD3Vj/023c00b34cd9c1392501eeaa7ab5b508/-Share_Asset-_Webinar__Horizontal___3_.jpeg","details":{"size":95484,"image":{"width":1250,"height":608}},"fileName":"-Share Asset- Webinar (Horizontal) (3).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1wSnju5ufr6iIDNm50jPo3","type":"Asset","createdAt":"2021-11-17T23:19:30.807Z","updatedAt":"2021-11-17T23:19:30.807Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity in Southeast Asia with NTUC","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1wSnju5ufr6iIDNm50jPo3/07847b71b7dc86a98683dd9f671c76be/Identity_and_Wine_Tasting_with_NTUC.mp4","details":{"size":150232277},"fileName":"Identity and Wine Tasting with NTUC.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cb6yAAA-aPA4z000000015CGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:48.330Z","title":"Auth0 Identity Platform on Azure","id":"identity-platform-azure-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4X9pLe8KEmjlw6vrbHRK2e","type":"Asset","createdAt":"2021-11-11T20:13:04.163Z","updatedAt":"2021-11-11T20:13:04.163Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 on Azure Webinar 2021 (600 x 856 px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4X9pLe8KEmjlw6vrbHRK2e/4c4e87434ae7b54ceb3582e886977f40/Auth0_on_Azure_Webinar_2021__600_x_856_px___1_.png","details":{"size":432852,"image":{"width":600,"height":856}},"fileName":"Auth0 on Azure Webinar 2021 (600 x 856 px) (1).png","contentType":"image/png"}}},"description":"Organizations moving to the cloud and selecting SaaS CIAM providers want to have significant control over sensitive customer and business data. They look for comprehensive solutions that fulfill both multiple functional requirements, such as compliance with data sovereignty and data residence; and business objectives such as selecting vendors that are not competitive to their business, and which integrate seamlessly with their existing technology investments.\nToday, they often have to make the hard choice of selecting a CIAM provider that either meets their functional needs, or one that enables their business goals. \n\nBut why choose?\n\nThe session will look at how you can:\n- Utilize a modern containerized technology stack to align with your existing technology investments\n- Meet data sovereignty and data residency through this private cloud deployment option\n- Maintain control over data storage, and feature updates, driving faster time to market\n\nWatch now to learn how you can easily expand your existing technology investments in Azure with Auth0.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3eARV8IBAv0ykGTw8ckCd7","type":"Asset","createdAt":"2021-11-11T20:03:19.343Z","updatedAt":"2021-11-11T20:03:19.343Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 on Azure Webinar 2021 (2400 x 1260 px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3eARV8IBAv0ykGTw8ckCd7/686d678df64d12680b5ec02e644b2226/Auth0_on_Azure_Webinar_2021__2400_x_1260_px_.png","details":{"size":1185237,"image":{"width":2400,"height":1260}},"fileName":"Auth0 on Azure Webinar 2021 (2400 x 1260 px).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6c9hlqhGbp91Ur92Yvf1iG","type":"Asset","createdAt":"2021-11-11T19:51:41.149Z","updatedAt":"2021-11-11T19:51:41.149Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Identity Platform on Azure 2021 Nov","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6c9hlqhGbp91Ur92Yvf1iG/b01b1aac62de152035407f9d556d55e4/Auth0_Identity_Platform_on_Azure.mp4","details":{"size":32547811},"fileName":"Auth0 Identity Platform on Azure.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb6sAAA-aPA4z0000000156GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:47.701Z","title":"The Future of Digital Identity Across Government \u0026 The Public Sector","id":"the-future-of-digitial-identity-gov-pub-sec","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"95La5ykTE3ocdCWUyNAWn","type":"Asset","createdAt":"2021-11-08T23:19:55.590Z","updatedAt":"2021-11-08T23:19:55.590Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Digital Identity Across Government \u0026 The Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/95La5ykTE3ocdCWUyNAWn/187a17e0d890133ae9b5f72e773e7501/_Landing_Page__Gated_Content___Logo__625x892px___3_.jpeg","details":{"size":152291,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content + Logo (625x892px) (3).jpeg","contentType":"image/jpeg"}}},"description":"The shift towards Digital Identities is happening.\n\nPublic sector organisations are starting to realise the invaluable opportunities brought by Digital Identities, but are also wary of the challenges. In September 2021, the UK Government announced plans for a new digital identity system with a budget of up to £400 million, pending review. The new system will enable users to verify their identity to access all Gov.UK services digitally, with one single sign-on. Whist it’s argued that the Government’s approach to digital identity has been poorly executed in the past, going forward, the vision is to create a simple, secure, and accessible system.\n\nBrought to you by GovNews \u0026 experts in digital identity, Auth0, this integral online learning exchange will explore the challenges and the opportunities to transforming your organisation’s approach to digital identities. We will explore the themes of enhancing citizen trust, management of ethical data, the renewed focus of government around identity and access management, as well as the need for integrated and streamlined digital services.\n\nThe Future of Digital Identity Across Government \u0026 The Public Sector will be facilitated by Mark Blanchard (Public Sector Director of GovNewsDirect) and will feature: \n- Jon Nash, Fellow at Demos\n- Steve Warburton, Shared Channels Experience Doctorate \u0026 Deputy Director Identity and Trust Services, DWP\n- Donna Joyce, Public Sector Account Director, Auth0\n\nAs part of this debate, we will be talking about overcoming common obstacles relating to digital accessibility, security and the user experience. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ti8bf3day5Fm5Sds6F2LE","type":"Asset","createdAt":"2021-11-08T23:20:52.551Z","updatedAt":"2021-11-08T23:20:52.551Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Digital Identity Across Government \u0026 The Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ti8bf3day5Fm5Sds6F2LE/524ccd35d6e3ab03eaa4e2d72de9bb7a/-Share_Asset-_Webinar__The_Future_of_Digital_Identity_Across_Government___The_Public_Sector_.jpeg","details":{"size":784851,"image":{"width":5000,"height":2432}},"fileName":"[Share Asset] Webinar (The Future of Digital Identity Across Government \u0026 The Public Sector).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"22fqusKxyaQF5vTAJHBZYS","type":"Asset","createdAt":"2021-11-09T00:01:05.487Z","updatedAt":"2021-11-09T00:01:05.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"The Future of Digital Identity Across Government \u0026 The Public Sector","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/22fqusKxyaQF5vTAJHBZYS/8b2df93cccfbc4a0e9f8c46617c4847d/The_Future_of_Digital_Identity_Across_Government___The_Public_Sector.mp4","details":{"size":788409838},"fileName":"The Future of Digital Identity Across Government \u0026 The Public Sector.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cb72AAA-aPA4z000000015GGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:47.166Z","title":"Identity with NIB Group","id":"identity-with-nib","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3lIQTf2SvO9Rc1OZZ3jI9h","type":"Asset","createdAt":"2021-11-05T00:44:23.876Z","updatedAt":"2021-11-05T00:44:23.876Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Identity w NIB (Cover v2)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3lIQTf2SvO9Rc1OZZ3jI9h/370991f3d2026eddbe87ff4fa83072a4/Identity_w_NIB_Cover_600_856.png","details":{"size":297702,"image":{"width":600,"height":856}},"fileName":"Identity_w_NIB_Cover_600_856.png","contentType":"image/png"}}},"description":"We were thrilled to host NIB Health Funds Head of Digital and Emerging Businesses Delivery, Trent McClenahan and Robert Williams Cybersecurity Manager, who shared their experience over multi-years how they have tackled issues like:\n1. Embarrassed with a high-friction digital experience where customers needed to remember several passwords/credentials across multiple digital assets\n2. Concerned with the risk of rolling out a custom authentication service in the midst of their transformational efforts and facing a high level of technical debt\n3. How they successfully moved from multiple, disconnected, mobile and web applications with separate identity/authentication services and no SSO to a single identity services\n\nKey takeaways:\n- Moving from a legacy application stack to modern identity without impacting customer experience\n- Balancing security features with CX\n- Enabling the digital experience platform \u0026 workforce identity","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7HGWKJcV3vtlEe1q1WfnC0","type":"Asset","createdAt":"2021-11-05T01:01:19.961Z","updatedAt":"2021-11-05T01:01:19.961Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Identity with NIB (Share)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7HGWKJcV3vtlEe1q1WfnC0/30564b2d34efb3c64fcb80554b8e8ccb/Identity_w_NIB_Share_2400_1260.png","details":{"size":679822,"image":{"width":2400,"height":1260}},"fileName":"Identity_w_NIB_Share_2400_1260.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"ZLmqKlRsn4jNpAAJ1uJGU","type":"Asset","createdAt":"2021-11-05T00:06:59.550Z","updatedAt":"2021-11-05T00:07:23.418Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"Identity \u0026 Wine Tasting with NIB Group - 2021 Oct recording","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/ZLmqKlRsn4jNpAAJ1uJGU/914d15725db17cbc31495f3584c34d01/Auth0_Identity_Conversation_with_NIB_Group.mp4","details":{"size":255960911},"fileName":"Auth0 Identity Conversation with NIB Group.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb6PAAQ-aPA4z000000014zGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:46.601Z","title":"Is Digital Identity Management a Distraction?","id":"is-digital-identity-management-a-distraction","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3s8KHdzCK0mEASH1yDzj7o","type":"Asset","createdAt":"2021-09-29T18:33:49.450Z","updatedAt":"2021-09-29T18:33:49.450Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Is Digital Identity Management a Distraction?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3s8KHdzCK0mEASH1yDzj7o/5da30ba3705d048106fe6b8862050533/_Landing_Page__Gated_Content__any___625x892px___1_.jpeg","details":{"size":153960,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (1).jpeg","contentType":"image/jpeg"}}},"description":"__How does a company create a common product, and become a market leader? How does a retailer grow their market share, during an economic crisis? How does a utility provider thrive in a crowded energy market?__\n\nSimple: all these companies focus on what they do best. No distractions. However, something as simple as your company’s login box is a great distraction. It is the entry point to your applications and services — and it means you are responsible for your customers’ digital identities.\n\nJoin Auth0 and Concept Data as we discuss some of the factors that see businesses align their strategy with their technical development, making it easier to:\n- Centralize systems\n- Eliminate technical debt and mitigate risk\n- Bring innovations in their products, applications and services to market, faster\n- Build and scale their identity and access management, so they can manage their customers’ digital identities, while being able to fully focus on doing what they do best","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1N9oQj3QxUzRq9dQUezthQ","type":"Asset","createdAt":"2021-11-03T11:15:37.170Z","updatedAt":"2021-11-03T11:15:37.170Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Is Digital Identity a Distraction? - Watch Now","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1N9oQj3QxUzRq9dQUezthQ/f2e8bb4d29a79d944c7676422f7444e6/Is_Digital_Identity_a_Distraction_-_Watch_Now.png","details":{"size":411718,"image":{"width":1250,"height":608}},"fileName":"Is Digital Identity a Distraction - Watch Now.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4PkTPpcWV72GmYIoQXzVqc","type":"Asset","createdAt":"2021-10-29T08:37:12.678Z","updatedAt":"2021-10-29T08:37:12.678Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Is Digital Identity Management a Distraction","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4PkTPpcWV72GmYIoQXzVqc/67da6be6018e361ea978386e97b916ee/Is_Digital_Identity_Management_a_Distraction.mp4","details":{"size":51882601},"fileName":"Is Digital Identity Management a Distraction.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb6QAAQ-aPA4z0000000150GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:46.292Z","title":"Demo: Auth0 CIAM on AWS for Public Sector","id":"demo-auth0-ciam-on-aws-for-public-sector","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6i7iZGUruXVLUZV6qE11Y9","type":"Asset","createdAt":"2021-10-26T20:22:07.444Z","updatedAt":"2021-10-26T20:22:07.444Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"Demo: Auth0 CIAM on AWS for Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6i7iZGUruXVLUZV6qE11Y9/6610f7c807e607f42c2ae3999d7d1767/Auth0_CIAM_on_AWS_for_Public_Sector.jpeg","details":{"size":133733,"image":{"width":600,"height":856}},"fileName":"Auth0 CIAM on AWS for Public Sector.jpeg","contentType":"image/jpeg"}}},"description":"Auth0 Solutions Architects will showcase how developers can quickly, easily, and securely improve government digital services with a modern identity platform.\n\nRegardless of programming language or technology stack, learn how to define the external identity providers and integrate with other technologies. We’ll touch upon Auth0’s extensibility and its applicability to Government-to-Citizen, Government-to-Business, and Government-to-Government use cases.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1IcVGVDtWCjeQHS11G2SMp","type":"Asset","createdAt":"2021-10-26T20:23:34.319Z","updatedAt":"2021-10-26T20:23:34.319Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 CIAM on AWS for Public Sector","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1IcVGVDtWCjeQHS11G2SMp/7aa51c09072fa2d50437e558776a47f2/-Share_Asset-_Webinar__Horizontal___1_.jpeg","details":{"size":106406,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] Webinar (Horizontal) (1).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7fLkuhp4AZqDMghMmtNxr9","type":"Asset","createdAt":"2021-10-26T21:00:30.652Z","updatedAt":"2021-10-26T21:00:30.652Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 CIAM on AWS for Public Sector Demo","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7fLkuhp4AZqDMghMmtNxr9/e1e8abf6abc1017f3d099d6ee455de56/2021_Auth0_CIAM_for_AWS_PubSec.mp4","details":{"size":220598219},"fileName":"2021_Auth0 CIAM for AWS PubSec.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cb6NAAQ-aPA4z0000000148GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:44.404Z","title":"Using Location Behavior to Enhance Mobile App Authentication","id":"incognia-auth0-location-behavior-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xmf20w6ZAadjEHHvL6OnM","type":"Asset","createdAt":"2021-08-06T17:40:08.356Z","updatedAt":"2021-08-06T17:40:08.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Using Location Behavior to Enhance Mobile App Authentication","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xmf20w6ZAadjEHHvL6OnM/ec35285c111b64fbe63bd3ba3cce95f6/Incognia_and_Auth0_Webinar_Share_Asset.jpg","details":{"size":108137,"image":{"width":600,"height":856}},"fileName":"Incognia and Auth0 Webinar Share Asset.jpg","contentType":"image/jpeg"}}},"description":"Leverage location behavior signals to reduce friction and increase security during mobile app experiences.\n\nJoin Auth0 and Incognia solution engineers as they demonstrate how Incognia’s location behavior signal and device intelligence is used to increase conversions and reduce fraud at authentication and authorization. Native applications can leverage Incognia’s location signal with Auth0 to silently measure risk at login, including device change detection, and at other moments in the user journey including in-app events, such as authorizing a money transfer or a password reset.\n\nWhat you’ll learn:\n- What is location behavior and how does it work for mobile authentication \u0026 authorization\n- What are the security and UX benefits of location behavior\n- How to use location behavior in native mobile applications\n- How to configure the Incognia Actions in Auth0","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6S8lYL8S18HYloWjrCRrxR","type":"Asset","createdAt":"2021-08-06T17:43:37.537Z","updatedAt":"2021-08-06T17:43:37.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Using Location Behavior to Enhance Mobile App Authentication","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6S8lYL8S18HYloWjrCRrxR/d314f5347de31543bd478044ed237d77/unnamed.jpeg","details":{"size":182674,"image":{"width":1600,"height":778}},"fileName":"unnamed.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7Ijpdtuc5WgfGwO8myts0A","type":"Asset","createdAt":"2021-08-06T17:44:41.569Z","updatedAt":"2021-08-06T17:44:41.569Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Using Location Behavior to Enhance Mobile App Authentication","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7Ijpdtuc5WgfGwO8myts0A/58cf21001f547e127acd382d0c5ffb40/Using_Location_Behavior_to_Enhance_Mobile_App_Authentication___Authorization.mp4","details":{"size":138459172},"fileName":"Using Location Behavior to Enhance Mobile App Authentication \u0026 Authorization.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN","ocid":"7014z000001cb6EAAQ-aPA4z000000013yGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:43.520Z","title":"How Identity Management Drives Cloud Innovation","id":"how-identity-management-drives-cloud-innovation","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2eCtHvNAbwVoCZouZkuqxW","type":"Asset","createdAt":"2021-07-21T16:52:34.353Z","updatedAt":"2021-07-21T16:52:34.353Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How Identity Management Drives Cloud Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2eCtHvNAbwVoCZouZkuqxW/42e8fd4a70abd73c872eb5971d145d02/Auth0-Resource_Cover-AWS-GC.png","details":{"size":355620,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-AWS-GC.png","contentType":"image/png"}}},"description":"According to [an IDSA survey of 502 security decision makers](https://www.idsalliance.org/blog/2020/05/14/research-shows-how-forward-thinking-enterprises-are-preventing-breaches/), 79% of organizations have experienced an identity-related security breach in the last two years. \n\nGiven the rapid rise in remote working and business migration to cloud-based apps, this is only a problem that is going to get worse. For organizations to meet the growing demands of cloud-based computing, they will need to ensure they have a robust, scalable IAM solution, but how?\n\nIn this webinar, Rob Hale, EMEA Cyber Security at AWS and Tobias Urban, Solutions Engineer at Auth0 explain how, as demands for the cloud grow, identity-as-a-service is key to managing the challenges of secure access and frictionless digital experiences. You will hear from one of AWS and Auth0's customers, Nordcloud, who share their journey so far with Auth0 and how they are leveraging the solution in their SaaS platforms. \n\nWatch this webinar as we cover:\n- Key points of security in the cloud\n- How to use the cloud to simplify and improve your security posture\n- Key identity management challenges that organizations face\n- Nordcloud - Key learnings from integrating an Identity Management layer into highly distributed serverless platform and high velocity teams","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7hnDkKCi5GRvg8FykiQEqR","type":"Asset","createdAt":"2021-07-21T16:53:17.172Z","updatedAt":"2021-07-21T16:53:17.172Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How Identity Management Drives Cloud Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7hnDkKCi5GRvg8FykiQEqR/ec6fb2eb88c92f24c1084feed7492337/Auth0-Share-asset-AWS-GC.png","details":{"size":416668,"image":{"width":1200,"height":584}},"fileName":"Auth0-Share-asset-AWS-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7Ggb62U03W1N4oo71DAESr","type":"Asset","createdAt":"2021-07-14T23:17:11.801Z","updatedAt":"2021-07-14T23:17:11.801Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How Identity Management Drives Cloud Innovation ","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7Ggb62U03W1N4oo71DAESr/dd93d680f65164f58b09b412972d62bd/How-Identity-Management_drives-Cloud-innovation.mp4","details":{"size":173988155},"fileName":"How-Identity-Management drives-Cloud-innovation.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb6IAAQ-aPA4z0000000142GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.891Z","title":"AWS + Auth0 Immersion Day Webinar","id":"aws-auth0-immersion-day-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1gIu5V3oy7eRJXJmfOTJGQ","type":"Asset","createdAt":"2021-06-16T16:09:31.997Z","updatedAt":"2021-06-25T16:00:34.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"Auth0 + AWS Immersion Day Workshop","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1gIu5V3oy7eRJXJmfOTJGQ/e6cfb39beb56576413f015ced7435eb2/Landing_Page_AWS_Immersion_Day_Workshop.jpeg","details":{"size":153505,"image":{"width":600,"height":856}},"fileName":"Landing Page_AWS Immersion Day Workshop.jpeg","contentType":"image/jpeg"}}},"description":"### AWS Immersion Day Workshop: Implement Multi-factor Authentication in React using Auth0 and AWS Amplify\n\n__About this Workshop:__\nIn this virtual workshop you can learn how to integrate a React Single-Page Application (SPA) with [Auth0](https://auth0.com/) and deploy it to AWS using [AWS Amplify](https://aws.amazon.com/amplify/). Auth0 will provide your React application with an authentication service that supports multi-factor authentication. AWS Amplify will allow you to quickly build, deploy, and host your React application on the cloud with AWS.\n\n__What you’ll learn:__\n- Auth0 Identity management capabilities and AWS Amplify\n- What is Multifactor Authentication and why it's important\n- How to integrate a React application with Auth0 and MFA\n- How to build, deploy and host a Single SPA into the AWS Cloud with AWS Amplify\n\n__Speaker(s):__\n- James Quick, Sr. Developer Advocate Engineer at Auth0 \n- Roy Rodan, Solutions Architect at AWS \n- Tony Song, Sr. ISV Partner Success Architect at AWS \n\n__Who should attend:__\nEngineers, developers, solution architects, tech leads, DevOps, information security, technical project, and program managers. \n\n__Before you Join/Prerequisites__\nThis workshop requires familiarity with React. You should also have the following software set up in your local machine:\n- Node.js v10.x or later\n- npm v5.x or later\n- [AWS CLI v2.x ](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2-windows.html)\n- AWS Amplify (See [How to Install the Amplify CLI doc](https://docs.amplify.aws/cli/start/install)) \n- Sign up for a [free Auth0 account ](https://a0.to/react-workshop-signup)","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7zP5WiiixisQJ8cSV7ca9o","type":"Asset","createdAt":"2021-06-22T22:44:46.434Z","updatedAt":"2021-06-22T22:44:46.434Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"AWS + Auth0 Immersion Day Webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7zP5WiiixisQJ8cSV7ca9o/616c5ef53c82330101bb0fc2a7ee4040/AWS_Immersion_Day_Workshop_Share_Asset.png","details":{"size":2186702,"image":{"width":5000,"height":2432}},"fileName":"AWS Immersion Day Workshop Share Asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4hLz3u8xgEcLurHgOc6OgT","type":"Asset","createdAt":"2021-06-25T15:53:53.786Z","updatedAt":"2021-06-25T15:53:53.786Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"AWS + Auth0 Immersion Day Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4hLz3u8xgEcLurHgOc6OgT/2894efc350cb7db6e6cf1bf2b049c168/AWS_and_Auth0_Immersion_day_webinar_v2.mp4","details":{"size":817375936},"fileName":"AWS and Auth0 Immersion day webinar_v2.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","ocid":"7014z000001cb5ZAAQ-aPA4z000000013cGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.620Z","title":"Live Demo: Auth0 Passwordless with WebAuthn","id":"live-demo-passwordless","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"YAhdJST63DclbBFvRqh6O","type":"Asset","createdAt":"2021-07-01T23:05:50.623Z","updatedAt":"2021-07-01T23:05:50.623Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Live Demo: Auth0 Passwordless with WebAuthn","file":{"url":"//images.ctfassets.net/2ntc334xpx65/YAhdJST63DclbBFvRqh6O/eb4005205152bc03a0bc81a49ba3a8eb/CoverImageAuth0Passwordless.jpeg","details":{"size":81913,"image":{"width":600,"height":856}},"fileName":"CoverImageAuth0Passwordless.jpeg","contentType":"image/jpeg"}}},"description":"### Maximize user experience and security with frictionless authentication\n\nMore access points = more opportunities for bad actors.\n\nTackling this issue in today’s technological landscape requires authentication that works for everyone. The issue with using passwords for this is three-fold: security, user experience, and costs.\n\nWatch now to learn how you can build and provide a frictionless and secure WebAuthn based authentication experience, supporting conversion and retention, and enabling users to easily authenticate with their preferred authentication method. \n\nThis demo will focus on the key benefits of Passwordless in action, including how:\n- WebAuthn-based passwordless authentication is unphishable, leaving you and your users more protected\n- Users can authenticate with WebAuthn biometrics and no further MFA step is needed.\n- Progressive enrollment presents users the option to enroll whenever they login with a biometric-capable device, easing the transition to passwordless. \n- Eliminating the overhead of password infrastructure and management costs can free up not only money, but IT resources as well. \n- Lock Passwordless is an embeddable widget that encapsulates the best practices for authentication with SMS and Email for Desktop, Tablet and Mobile Devices","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6aTlab01AS9MQoDKFLymud","type":"Asset","createdAt":"2021-07-01T23:13:18.990Z","updatedAt":"2021-07-01T23:13:18.990Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Live Demo: Auth0 Passwordless with WebAuthn","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6aTlab01AS9MQoDKFLymud/7dec069e8509e777599d41e7912a451f/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":91135,"image":{"width":1250,"height":608}},"fileName":"[Share Asset] Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"58QdXsjlIo2cUUA5Od1ohZ","type":"Asset","createdAt":"2021-07-01T23:04:46.186Z","updatedAt":"2021-07-01T23:04:46.186Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Live Demo: Auth0 Passwordless with WebAuthn","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/58QdXsjlIo2cUUA5Od1ohZ/9b4107d164652effd6028ad1b2400f20/LiveDemo-Auth0Passwordless.mp4","details":{"size":46870916},"fileName":"LiveDemo-Auth0Passwordless.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","ocid":"7014z000001cb5bAAA-aPA4z000000013eGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:42.263Z","title":"2021 Auth0 State of Secure Identity Webinar","id":"state-of-security-identity-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"68xvYQhiWqzEy9tQ9J1i58","type":"Asset","createdAt":"2021-06-23T21:38:11.441Z","updatedAt":"2021-06-24T18:15:52.818Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2021 Auth0 State of Secure Identity Webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/68xvYQhiWqzEy9tQ9J1i58/765a03e30c8e8337f4a51e2f2a583dc3/State-of-Secure-Identity-Cover-Page.jpeg","details":{"size":89781,"image":{"width":600,"height":856}},"fileName":"State-of-Secure-Identity-Cover-Page.jpeg","contentType":"image/jpeg"}}},"description":"Digital identities control access to an ever-growing number of applications, services, and critical systems. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security.\n\nThe 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies.\n\nDuring this webinar, we’ll provide greater insight into which industries are: \n- Most highly targeted by credential stuffing attacks\n- Most highly targeted by SQL injection attacks\n- Leading the way in MFA adoption to improve overall security posture\n\nWe’ll also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"68FYurZ2OVMvPX2SjzQoY2","type":"Asset","createdAt":"2021-06-23T21:38:36.180Z","updatedAt":"2021-06-23T21:38:36.180Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"2021 Auth0 State of Secure Identity Webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/68FYurZ2OVMvPX2SjzQoY2/b47016c56f02e3f1f5b35198fa2e6562/State-of-Secure-Identity-Horizontal-Share.jpeg","details":{"size":109143,"image":{"width":1250,"height":608}},"fileName":"State-of-Secure-Identity-Horizontal-Share.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5nmm0XrplXjAg1q1AnwZ2Q","type":"Asset","createdAt":"2021-06-24T18:11:21.235Z","updatedAt":"2021-06-24T18:11:31.000Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"2021 Auth0 State of Secure Identity Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/5nmm0XrplXjAg1q1AnwZ2Q/effbf9667741b96189df4391230310d3/2021_Auth0_State_of_Secure_Identity_Report_Webinar.mp4","details":{"size":64077118},"fileName":"2021 Auth0 State of Secure Identity Report Webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","ocid":"7014z000001cb67AAA-aPA4z000000013rGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:41.972Z","title":"How to Add Flexible Identity Verification Workflows","id":"iddw-auth0-flexible-id-verification","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7CAtFnwXqSFhIRIS8IJqPC","type":"Asset","createdAt":"2021-06-24T18:49:23.657Z","updatedAt":"2021-06-24T18:49:23.657Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"How to Add Flexible Identity Verification Workflows","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7CAtFnwXqSFhIRIS8IJqPC/8e64e96b8bc473997de6c07d1248cdac/IDDW_WEbinar_Cover_Image.png","details":{"size":191662,"image":{"width":600,"height":856}},"fileName":"IDDW WEbinar Cover Image.png","contentType":"image/png"}}},"description":"Auth0 and ID Dataweb combine to offer a seamless secure experience for a consumer’s digital identity. Starting at registration, a consumer’s physical and virtual identities are linked and verified through a robust orchestration of their device, attributes and biometrics.\n\nThe extensible building blocks and configuration capabilities of the joint solution make a secure frictionless user experience simple to build.\n\nIn this session, we will cover:\n- How to easily build a workflow verifying device possession, device ownership and biometric identity\n- How to integrate the appropriate level of verification into account registration and recovery processes\n- How to report and analyze fraudulent account interactions","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7rjcTCxyYaEJaJ6mcJS30c","type":"Asset","createdAt":"2021-06-24T18:50:08.947Z","updatedAt":"2021-06-24T18:50:08.947Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How to Add Flexible Identity Verification Workflows","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7rjcTCxyYaEJaJ6mcJS30c/b3e09162224f02326ec0315ff54a779a/IDDW_Share_Asset.png","details":{"size":2268583,"image":{"width":5000,"height":2432}},"fileName":"IDDW Share Asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1bjXqrYZUM1X9Ay0tPbBD6","type":"Asset","createdAt":"2021-06-24T18:52:23.783Z","updatedAt":"2021-06-24T18:52:23.783Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How to Add Flexible Identity Verification Workflows","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1bjXqrYZUM1X9Ay0tPbBD6/692e790d7a9776125d7467a1c111e22d/How_to_add_flexible_identity_verification_to_your_Auth0_deployment.mp4","details":{"size":286034223},"fileName":"How to add flexible identity verification to your Auth0 deployment.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","ocid":"7014z000001cb6DAAQ-aPA4z000000013xGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:40.961Z","title":"Driving Business with an Identity-Driven User Experience","id":"driving-business-with-id-driven-ux","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1e9mzgH3DyduCrA4XE8KKl","type":"Asset","createdAt":"2021-06-08T23:22:28.624Z","updatedAt":"2021-06-16T20:22:53.827Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Driving Business with an Identity-Driven User Experience","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1e9mzgH3DyduCrA4XE8KKl/0129cc6449a705f4ff20c0b8261a3c9f/Auth0-Resource_Cover-Houston-GC.png","details":{"size":254374,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Houston-GC.png","contentType":"image/png"}}},"description":"If you aim to excite through a great user experience, choosing the right Customer Identity and Access Management (CIAM) solution is critical. As you probably know, identity is not only about securing your users data, but it has to support you in attracting, guiding and retaining your customers. \n\nIn this webinar Auth0, in partnership with Houston, experts in building tailored digital experiences, share their experiences and guidance on how to build a great, identity-driven user experience. \n\nWatch the on-demand webinar as we cover:\n- How to start, execute and nurture your CIAM implementation in your own application \n- How to capture the full potential of this transformation\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4MlqT0YVqeNd0yjMZRJoMr","type":"Asset","createdAt":"2021-06-08T23:21:11.194Z","updatedAt":"2021-06-16T20:22:59.923Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Driving Business with an Identity-Driven User Experience","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4MlqT0YVqeNd0yjMZRJoMr/2cc0034472963230898a9348ea608126/Auth0-Share-asset-Houston-GC.png","details":{"size":928455,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Share-asset-Houston-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"26SFabg7slfm7bkAeQYGM0","type":"Asset","createdAt":"2021-06-08T22:26:42.894Z","updatedAt":"2021-06-08T22:26:42.894Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Driving Business with an Identity-Driven User Experience","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/26SFabg7slfm7bkAeQYGM0/53c2953ad976a07b02d1885747a6fd7a/Driving_Business_with_an_Identity-Driven_User_Experience.mp4","details":{"size":191656339},"fileName":"Driving Business with an Identity-Driven User Experience.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2tmO8LYOytb8M714pxKFpx","type":"Asset","createdAt":"2021-06-08T23:24:19.976Z","updatedAt":"2021-06-16T20:23:12.271Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Driving Business with an Identity-Driven User Experience","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2tmO8LYOytb8M714pxKFpx/85795225fdf095fee0391bab385e25a2/Auth0-Share-asset-Houston-GC-Square.png","details":{"size":1855584,"image":{"width":2267,"height":2267}},"fileName":"Auth0-Share-asset-Houston-GC-Square.png","contentType":"image/png"}}},"ocid":"7014z000001cb5cAAA-aPA4z000000013fGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:40.398Z","title":"Healthcare is everyone's business","id":"healthcare-is-everyones-business","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31AmI6sn6vGg4JMwolJNcX","type":"Asset","createdAt":"2021-06-10T17:57:32.701Z","updatedAt":"2021-06-16T20:12:09.498Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Healthcare is Everyone's Business","file":{"url":"//images.ctfassets.net/2ntc334xpx65/31AmI6sn6vGg4JMwolJNcX/d76bf74e55e11f6f6adb240cac9dc8d1/Auth0-Resource_Cover-Scaled_Access-GC.png","details":{"size":323498,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Scaled_Access-GC.png","contentType":"image/png"}}},"description":"With the sensitive information found in healthcare applications, access must always be secure and compliant. However, effective collaboration across the healthcare ecosystem requires the sharing of that information, especially with family members also wishing for access. So how do you keep it secure and compliant at all times?\n\nIn this webinar Ward Duchamps, CEO at Scaled Access, and Tobias Urban, Partner Solutions Engineer at Auth0, explain how to build access systems that provide users with an intuitive and consistent experience and that ensure seamless and secure access to your healthcare systems, resources, and services.\n\nWatch the on-demand webinar as we cover:\n- How to more effectively collaborate with healthcare partner organizations\n- How to build a better and more secure user experience\n- Case Study: Secure healthcare collaboration in action","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3bJutRLWjGN3fpFxmfD745","type":"Asset","createdAt":"2021-06-10T17:57:13.990Z","updatedAt":"2021-06-16T20:11:47.857Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Healthcare is Everyone's Business","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3bJutRLWjGN3fpFxmfD745/40c27d68db9e6463be51c50e6de45426/Auth0-Share-asset-Scaled_Access-GC.png","details":{"size":1206487,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Share-asset-Scaled_Access-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"72PsWheiO9Y5ZoRLjo2vxN","type":"Asset","createdAt":"2021-06-10T17:55:47.572Z","updatedAt":"2021-06-10T17:55:47.572Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Healthcare is everyone's business","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/72PsWheiO9Y5ZoRLjo2vxN/8d4a5e6740def797ccbc2401c88567fd/Healthcare_is_everyone-s_business.mp4","details":{"size":103284813},"fileName":"Healthcare is everyone's business.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"38S74LJAijx8vGdIh4vWV3","type":"Asset","createdAt":"2021-06-10T17:56:40.176Z","updatedAt":"2021-06-16T20:11:55.526Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Healthcare is Everyone's Business","file":{"url":"//images.ctfassets.net/2ntc334xpx65/38S74LJAijx8vGdIh4vWV3/c2f92df29262297598689def6494e3e5/Auth0-Share-asset-Scaled_Access-GC-Square.png","details":{"size":2389380,"image":{"width":2267,"height":2267}},"fileName":"Auth0-Share-asset-Scaled_Access-GC-Square.png","contentType":"image/png"}}},"ocid":"7014z000001cb5hAAA-aPA4z000000013kGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:39.449Z","title":"Modern CIAM: Platform and Centerpiece of Your Innovation","id":"ciam-centerpiece-of-your-innovation","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"01dNoWbZGD85hMqsE73kWt","type":"Asset","createdAt":"2021-06-03T16:48:39.139Z","updatedAt":"2021-06-16T20:24:52.966Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modern CIAM: Platform and Centerpiece of Your Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/01dNoWbZGD85hMqsE73kWt/031babb94eac94ea30463246a16cc7f6/Auth0-Resource_Cover-Booleans-GC.png","details":{"size":337773,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Booleans-GC.png","contentType":"image/png"}}},"description":"CIAM sits at the intersection of security, customer experience, and analytics. CIAM systems offer basic features that every business needs but that most often don’t create value for their customers on their own, like login or user management.\n\nIn this webinar, Booleans and Auth0 show the possibilities offered by modern identity management beyond the pure login box. By embedding their CIAM systems into existing business processes, relieving the burden on product development and freeing up time for innovation, the two experts explain how CIAM tools can contribute to the digital transformation and revenue growth of your company. \n\nWhat does this webinar cover?\n- Features of modern CIAM solutions and the benefits of standard solutions\n- Potential value of integrating identity management solutions into your business processes\n- Customer examples of successful integrations and achieved potentials\n- The necessary conditions and mindsets for an optimized consumer relation\n\nThe session also includes a panel discussion where Mike Rawson, Chief Information Officer (CIO) at CitizenM shares his experience.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"29QRsbnYh6tRtE1bIalkJ1","type":"Asset","createdAt":"2021-06-03T16:49:41.315Z","updatedAt":"2021-06-16T20:24:59.942Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modern CIAM: Platform and Centerpiece of Your Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/29QRsbnYh6tRtE1bIalkJ1/6521af258d9ae7355a0d2793109b82e5/Auth0-Share-asset-Booleans-GC.png","details":{"size":1451105,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Share-asset-Booleans-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"31VbguZAsDoolNGuQ0tWr6","type":"Asset","createdAt":"2021-06-03T17:04:35.185Z","updatedAt":"2021-06-03T17:04:35.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Modern CIAM Platform and Centerpiece of Your Innovation","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/31VbguZAsDoolNGuQ0tWr6/377c6bb3101cfcd6b9a569d7964b3fe2/Modern_CIAM__Platform_and_Centerpiece_of_Your_Innovation.mp4","details":{"size":104689962},"fileName":"Modern CIAM_ Platform and Centerpiece of Your Innovation.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ly53pVcqgoUILjcin43f7","type":"Asset","createdAt":"2021-06-03T16:50:37.909Z","updatedAt":"2021-06-16T20:25:09.247Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modern CIAM: Platform and Centerpiece of Your Innovation","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ly53pVcqgoUILjcin43f7/c877d066165036af9f18f381be01b5b5/Auth0-Share-asset-Booleans-GC-Square.png","details":{"size":2791350,"image":{"width":2267,"height":2267}},"fileName":"Auth0-Share-asset-Booleans-GC-Square.png","contentType":"image/png"}}},"ocid":"7014z000001cb5aAAA-aPA4z000000013dGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:12:39.115Z","title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","id":"ciam-consent-management-on-demand-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UbcJWuSSUCSyDJeTi1kAI","type":"Asset","createdAt":"2021-06-02T04:12:43.386Z","updatedAt":"2021-06-16T20:25:56.440Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UbcJWuSSUCSyDJeTi1kAI/017c559c8183f46b60d170b7f9084e30/getresult.jpeg","details":{"size":98894,"image":{"width":600,"height":856}},"fileName":"getresult.jpeg","contentType":"image/jpeg"}}},"description":"A Webinar Discussion Featuring Auth0 and Special Guest, OneTrust | May 26, 2021\n\nListen in as Auth0’s Antonio Fuentes, Product Lead, Customer Identity and Access Management and special guest Claire Feeney, Product Marketing Manager, OneTrust PreferenceChoice discuss how our comprehensive CIAM solution provides you with the technical mechanisms to enable an effective compliance program. Most importantly, the combined solutions can create an outstanding user experience for success in online commerce and your digital business.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3u4peowckqDRJIJmHLXpTi","type":"Asset","createdAt":"2021-06-02T04:13:17.641Z","updatedAt":"2021-06-16T20:26:02.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3u4peowckqDRJIJmHLXpTi/957e0a60a2b86e9b339a08d6c2f621af/-Default-_Headline_template_1250x608px.jpeg","details":{"size":890803,"image":{"width":5000,"height":2432}},"fileName":"[Default] Headline_template_1250x608px.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7yvYUsZqxKT9vkXvHoFKK1","type":"Asset","createdAt":"2021-06-02T04:42:30.686Z","updatedAt":"2021-06-02T04:42:30.686Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"GMT20210526-151541 Recording 1920x1080 (1)","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7yvYUsZqxKT9vkXvHoFKK1/5f80cc224bb3f530cfc84daed2139b7c/GMT20210526-151541_Recording_1920x1080__1_.mp4","details":{"size":41313528},"fileName":"GMT20210526-151541_Recording_1920x1080 (1).mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4LNuSSGWjSdo44hGEU7Dk5","type":"Asset","createdAt":"2021-06-02T04:39:35.788Z","updatedAt":"2021-06-16T20:26:09.097Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Deliver Secure, Seamless Experiences with CIAM and Consent Management","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4LNuSSGWjSdo44hGEU7Dk5/a7f5f62c00a8421771cea6676ddcd274/resource_thumb_76.jpg","details":{"size":41303,"image":{"width":581,"height":388}},"fileName":"resource_thumb_76.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb5XAAQ-aPA4z000000013ZGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:12:36.199Z","title":"Live Demo: Auth0 for Customer Identity","id":"live-demo-auth0-for-ciam-04-2021","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7j7BuYiaBH9qMcFiyZyIiD","type":"Asset","createdAt":"2021-04-23T00:47:57.378Z","updatedAt":"2021-04-23T00:56:00.146Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"[Landing Page] Gated Content (any) (625x892px) (2)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7j7BuYiaBH9qMcFiyZyIiD/3c70f2212c3af98347ceb2bc4319e60d/_Landing_Page__Gated_Content__any___625x892px___2_.jpeg","details":{"size":64159,"image":{"width":600,"height":856}},"fileName":"[Landing Page] Gated Content (any) (625x892px) (2).jpeg","contentType":"image/jpeg"}}},"description":"Identity is the front door to every user interaction. Learn how you can solve the most common challenges that customer-facing applications face today. Support user convenience, privacy, security AND drive business growth, all within a single extensible platform: Auth0. \n\nThis demo focuses on:\n- Streamlining the registration process (including social logins) \n- Building a single view into user profiles and data including the ability to enhance user profiles with identity-based progressive profiling\n- Building out integrations with CRM, analytics, consent management or any downstream platform\n- Enhancing and delivering contextual security to your end-users without compromising customer experience","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2EiQ3hzksLs16lNBGncxOe","type":"Asset","createdAt":"2021-04-23T00:47:30.263Z","updatedAt":"2021-04-23T00:47:30.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"[Default] Title + Image template 1250x608px","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2EiQ3hzksLs16lNBGncxOe/08fc35a5eb40a5561a626d2d1c1e4b81/-Default-_Title___Image_template_1250x608px.jpeg","details":{"size":654304,"image":{"width":5000,"height":2432}},"fileName":"[Default] Title + Image_template_1250x608px.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"J5iyLJKGNGovHlZVM3svz","type":"Asset","createdAt":"2021-04-23T00:38:50.737Z","updatedAt":"2021-04-23T00:38:50.737Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Live Demo Auth0 for Customer Identity","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/J5iyLJKGNGovHlZVM3svz/632f30f6763e83b6d2aba32839affc75/Live_Demo__Auth0_for_Customer_Identity.mp4","details":{"size":38481544},"fileName":"Live Demo_ Auth0 for Customer Identity.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3XovMI0fwOFpUSeR9A0OGF","type":"Asset","createdAt":"2021-04-23T00:49:49.045Z","updatedAt":"2021-04-23T00:49:49.045Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Video Template Square (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3XovMI0fwOFpUSeR9A0OGF/6cd15c8167dc155a045dc8af2c6e3073/Video_Template_Square__1_.jpeg","details":{"size":1103977,"image":{"width":5001,"height":5001}},"fileName":"Video_Template_Square (1).jpeg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb5PAAQ-aPA4z000000013PGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:11:52.888Z","title":"How a Trusted User Login Can Fuel Your Business Growth","id":"trusted-user-login-criipto","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1pRKKaxcbCDVqi2jEX8EFl","type":"Asset","createdAt":"2021-03-29T13:07:33.061Z","updatedAt":"2021-04-20T21:51:16.804Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":2,"locale":"en-US"},"fields":{"title":"How a Trusted User Login can Fuel Your Business Growth - Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1pRKKaxcbCDVqi2jEX8EFl/f8f21116e53056cc927331f5913d51f2/Auth0-Trusted-User-Login-Cover.png","details":{"size":146706,"image":{"width":600,"height":856}},"fileName":"Auth0-Trusted-User-Login-Cover.png","contentType":"image/png"}}},"description":"In this 30-minute webinar, Niels Flensted-Jensen, Co-founder and Managing Director at Criipto, and Tobias Urban, Partner Solutions Engineer at Auth0, will show you how Authentication goes way beyond than just having an email address and a password. You will also learn how you can use those modern login options to fuel your business, both at and after the login.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3TN74EBuUQTEnw3g3qB1wa","type":"Asset","createdAt":"2021-03-29T13:08:16.309Z","updatedAt":"2021-03-29T13:08:16.309Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How a Trusted User Login can Fuel Your Business Growth","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3TN74EBuUQTEnw3g3qB1wa/c97bf7787e7ba7c1248a9712ab2d7738/Auth0-Trusted-User-Login-Shared.png","details":{"size":366804,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Trusted-User-Login-Shared.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"53ZiP5YRY0nM0alm6vKTGu","type":"Asset","createdAt":"2021-03-29T13:10:59.831Z","updatedAt":"2021-03-30T13:54:13.765Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"How a Trusted User Login can Fuel Your Business Growth","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/53ZiP5YRY0nM0alm6vKTGu/97c7ca320e2d60dcfe810b268531c80d/How_a_Trusted_User_Login_can_Fuel_Your_Business_Growth.mp4","details":{"size":92983171},"fileName":"How a Trusted User Login can Fuel Your Business Growth.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ucr0nJLHpWDYNcp2RYY48","type":"Entry","createdAt":"2021-04-08T15:20:46.115Z","updatedAt":"2021-04-08T15:20:46.115Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0 + Criipto","twitter":"https://twitter.com/auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"64IXG2Rl53WrXv3hp5EIvz","type":"Asset","createdAt":"2021-04-08T15:18:32.307Z","updatedAt":"2021-04-08T15:18:32.307Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0+Criipto","file":{"url":"//images.ctfassets.net/2ntc334xpx65/64IXG2Rl53WrXv3hp5EIvz/183f7b9d7a7b24490a0965d2a3f4141f/Auth0_Criipto.png","details":{"size":40859,"image":{"width":420,"height":420}},"fileName":"Auth0+Criipto.png","contentType":"image/png"}}}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"umkVk8eg2erxutrcnH1CR","type":"Asset","createdAt":"2021-03-29T13:13:22.596Z","updatedAt":"2021-03-29T13:13:22.596Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How a Trusted User Login can Fuel Your Business Growth","file":{"url":"//images.ctfassets.net/2ntc334xpx65/umkVk8eg2erxutrcnH1CR/e6c1a7ff6687b4dbab107701491da105/Auth0-Trusted-User-Login-Thumbnail.png","details":{"size":521381,"image":{"width":1162,"height":905}},"fileName":"Auth0-Trusted-User-Login-Thumbnail.png","contentType":"image/png"}}},"ocid":"7014z000001cb4rAAA-aPA4z000000013FGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:11:52.195Z","title":"Modern Digital Identity: How to Wow Customers with a First Impression","id":"is4u-modern-digital-identity","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"66K7BBNt6BM3l17fsHYPlQ","type":"Asset","createdAt":"2021-03-31T19:55:39.035Z","updatedAt":"2021-03-31T19:55:39.035Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Modern Digital Identity: How to Wow customers with a first impression","file":{"url":"//images.ctfassets.net/2ntc334xpx65/66K7BBNt6BM3l17fsHYPlQ/b2b3629f98fade44e1ee831bc07a1904/Auth0-Resource_Cover-IS4U.png","details":{"size":219011,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-IS4U.png","contentType":"image/png"}}},"description":"Really knowing your user in an internet business is hard. You need a strong authentication and verification process but once you have that how can you leverage that insight?\n\nHaving strong user login combined with the right platform not only fulfills governance requirements but also is a great starting point to build better services for your users and make a good first impression.\n\nIn this 45-minute webinar, Robin Gorris, Digital Identity Architect at IS4U, and Tobias Urban, Partner Solutions Engineer at Auth0, will show the possibilities offered by modern identity management beyond the pure login box. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5mzAz7ijeqGtgF62UPWQSe","type":"Asset","createdAt":"2021-03-31T19:55:44.460Z","updatedAt":"2021-03-31T19:55:44.460Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Modern Digital Identity: How to Wow customers with a first impression","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5mzAz7ijeqGtgF62UPWQSe/60c601407fa4162d87c9880a08754091/Auth0-Share-asset-IS4U.png","details":{"size":821342,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Share-asset-IS4U.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3hl6bUFXlEhyVSBElWy6Yz","type":"Asset","createdAt":"2021-03-31T19:55:49.425Z","updatedAt":"2021-03-31T19:55:49.425Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Modern Digital Identity: How to Wow customers with a first impression","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3hl6bUFXlEhyVSBElWy6Yz/9df01ae512790111a464645bab00b44d/Modern_Digital_Identity-_How_to_Wow_your_customers_with_a_good_first_impression.mp4","details":{"size":144796615},"fileName":"Modern Digital Identity- How to Wow your customers with a good first impression.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"14j3p9ahsZC9p3nYPNFSdq","type":"Entry","createdAt":"2021-04-08T15:19:29.702Z","updatedAt":"2021-04-08T15:19:29.702Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0 + IS4U","twitter":"https://twitter.com/auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"54A2xw5pWeZhRcO7XvmNo3","type":"Asset","createdAt":"2021-04-08T15:18:14.408Z","updatedAt":"2021-04-08T15:18:14.408Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0+IS4U","file":{"url":"//images.ctfassets.net/2ntc334xpx65/54A2xw5pWeZhRcO7XvmNo3/acf50783f3384e7e775d878fca4fbf73/Auth0_IS4U.png","details":{"size":55641,"image":{"width":420,"height":420}},"fileName":"Auth0+IS4U.png","contentType":"image/png"}}}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"AMOqbdQYYhkzZOkkXn9I9","type":"Asset","createdAt":"2021-03-31T19:55:53.882Z","updatedAt":"2021-03-31T19:55:53.882Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Modern Digital Identity: How to Wow customers with a first impression","file":{"url":"//images.ctfassets.net/2ntc334xpx65/AMOqbdQYYhkzZOkkXn9I9/15e5467df896fa4e78314860bd1d521c/Auth0-Thumbnail-IS4U.png","details":{"size":755176,"image":{"width":938,"height":938}},"fileName":"Auth0-Thumbnail-IS4U.png","contentType":"image/png"}}},"ocid":"7014z000001cb4vAAA-aPA4z000000013JGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:11:48.421Z","title":"Auth0 for B2B Identity Management ","id":"on-demand-demo-b2b-identity-management-auth0","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5UAzKJQBHUYpKrvxYskYH6","type":"Asset","createdAt":"2021-02-24T23:47:50.785Z","updatedAt":"2021-02-24T23:47:50.785Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Untitled design (5)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5UAzKJQBHUYpKrvxYskYH6/b18b7d8d5d8cbb22fd405577b704b145/Untitled_design__5_.png","details":{"size":272861,"image":{"width":600,"height":856}},"fileName":"Untitled design (5).png","contentType":"image/png"}}},"description":"Building identity management is complex, expensive, and difficult. So don’t. Increase revenue, minimize risk, and reduce the sales cycle with Auth0 for both new and existing apps.\n\nSee the Auth0 platform live in action. We’ll touch upon Auth0’s unmatched extensibility and specific applicability to B2B use cases. \n\nLearn __how you can__:\n\n- Deliver a better and frictionless user experience by turning on federated authentication \n- Improve IT manageability and user efficiency by enabling Single Sign-On access to multiple applications\n- Enable multi-factor authentication, anomaly detection, and more with the flip of a switch\n- Assign RBAC authorization policies to users to allow for different permissions within your application\n\nPresenter: __Crystal Poenisch__, Product Marketing Manager, Auth0","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3VSK3s7Br6kndxJe5ShsVo","type":"Asset","createdAt":"2021-01-29T21:08:02.723Z","updatedAt":"2021-02-01T03:19:11.148Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"Auth0 for B2B Identity Management Share Asset","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3VSK3s7Br6kndxJe5ShsVo/46094d7c567feb8c1c4cce20983ed30c/B2Bdemo-ShareAsset-2400x1260px.jpeg","details":{"size":368987,"image":{"width":2400,"height":1260}},"fileName":"B2Bdemo-ShareAsset-2400x1260px.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4Wv5b4L8Fts5CBOPMsmk7y","type":"Asset","createdAt":"2021-02-24T23:50:13.431Z","updatedAt":"2021-02-24T23:50:13.431Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 for B2B Identity Management (1)","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4Wv5b4L8Fts5CBOPMsmk7y/b5a0a2aaea01a1caf9afe4fc18d73cb1/Auth0_for_B2B_Identity_Management__1_.mp4","details":{"size":68936079},"fileName":"Auth0 for B2B Identity Management (1).mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3r7EWGt1iX1QqqqfTrAtth","type":"Entry","createdAt":"2021-01-29T21:08:42.991Z","updatedAt":"2021-05-10T21:18:14.367Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"Vubq4x3eQ4EspNaqsn2a7","type":"Asset","createdAt":"2021-01-29T21:12:33.774Z","updatedAt":"2021-01-29T21:12:33.774Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 for B2B Identity Management Thumbnail","file":{"url":"//images.ctfassets.net/2ntc334xpx65/Vubq4x3eQ4EspNaqsn2a7/7673f0842ef731013e756e5488335e53/B2Bdemo_thumbnail.png","details":{"size":518619,"image":{"width":1228,"height":1206}},"fileName":"B2Bdemo_thumbnail.png","contentType":"image/png"}}},"ocid":"7014z000001cb4jAAA-aPA4z0000000137GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:10:11.346Z","title":"Expanding our Ecosystem with Auth0 Marketplace","id":"marketplace-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"NtaJUP4QqCjydjcyoNqBy","type":"Asset","createdAt":"2020-10-09T19:17:23.624Z","updatedAt":"2020-10-12T20:39:25.566Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Expanding our Ecosystem with Auth0 Marketplace Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/NtaJUP4QqCjydjcyoNqBy/ab034adf9a3599a87e61fb5442cfc8dc/Marketplace_Webinar_Resources_Page_Cover.jpeg","details":{"size":135160,"image":{"width":600,"height":856}},"fileName":"Marketplace Webinar Resources Page Cover.jpeg","contentType":"image/jpeg"}}},"description":"Securing and managing systems is inherently complex due to changing threat sources, evolving standards, new attack vectors, variations in applications, and differing user profiles. Rigid, set-and-forget solutions don't allow for future unanticipated needs and use cases.\n\nA new reality is emerging where identity must be programmable, adaptable, and extensible to support developers, admins and operators’ innovation needs across the entire No, Low, Pro-code spectrum.\n\nIdentity platforms must cultivate a vibrant ecosystem that fosters partner and community-driven innovation, inputs, and APIs. These sources combine to create a solution flywheel, which we are putting in motion for you today. \n\nTo kick off this flywheel, we introduce __Auth0 Marketplace__ — a trusted catalog of integrations that enables application teams to easily assemble complete identity solutions. \n\n__Moderator:__\nShafiq Shivji, *Product Marketing Manager, Auth0*\n\n__Featuring:__\nDarin LaFramboise, *Principal PM, Ecosystem, Auth0*","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"571Q54S7ZTzRjQC4HsJAKa","type":"Asset","createdAt":"2020-10-09T19:05:17.442Z","updatedAt":"2020-10-12T20:38:46.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":3,"locale":"en-US"},"fields":{"title":"Expanding our Ecosystem with Auth0 Marketplace Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/571Q54S7ZTzRjQC4HsJAKa/213c29a690cf064dc4e767cd1f16e869/Marketplace_Webinar_Resources_Page__Share_Asset.jpeg","details":{"size":322582,"image":{"width":2400,"height":1260}},"fileName":"Marketplace Webinar Resources Page_ Share Asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5sGj8ko6tDxmmOM1SFnA9A","type":"Asset","createdAt":"2020-10-12T20:35:15.745Z","updatedAt":"2020-10-12T20:35:15.745Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Expanding our Ecosystem with Auth0 Marketplace","description":"Learn about Auth0 Marketplace — a trusted catalog of integrations that enables application teams to easily assemble complete identity solutions. ","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/5sGj8ko6tDxmmOM1SFnA9A/f0a1a014bbdb448008835082cc7f3ce8/Auth0_Marketplace_Webinar.mp4","details":{"size":320627474},"fileName":"Auth0 Marketplace Webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1lGwF3G3s87LihVOVd3ayh","type":"Asset","createdAt":"2020-10-13T22:43:33.977Z","updatedAt":"2020-10-13T22:43:33.977Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Marketplace","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1lGwF3G3s87LihVOVd3ayh/4dc6982dffaa22246f1cf2d3b259e32e/Marketplace_Webinar_Resources_Page_Cover.jpg","details":{"size":139676,"image":{"width":600,"height":478}},"fileName":"Marketplace_Webinar_Resources_Page_Cover.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb3YAAQ-aPA4z000000012aGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:57.420Z","title":"Mistakes to Love: A Survey of Identity Mistakes","id":"mistakes-to-love-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4OzfRKMFemQlsI3kLUmm8J","type":"Asset","createdAt":"2020-03-20T01:06:47.359Z","updatedAt":"2020-03-20T01:06:47.360Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Mistakes GCImage (1)","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4OzfRKMFemQlsI3kLUmm8J/eb4115a5b726c93bde9ba97493adf19c/Mistakes_GCImage__1_.jpeg","details":{"size":85174,"image":{"width":600,"height":856}},"fileName":"Mistakes_GCImage (1).jpeg","contentType":"image/jpeg"}}},"description":"Are you about to embark on an identity project for the first time? Or maybe you’re about to work on yet another identity project and want it to be smoother than the last? Are you already stealing away time for the architectural design challenges, project management across multiple stakeholders, and unforeseen scoping mistakes?\n\nRegardless of whether you have decided to build or buy identity, the most practical help and advice might come from those who are trying to accomplish the same goals as you are, and who may have learned from mistakes the experts hadn’t even thought about. So we surveyed your peers to find out.\n\nJoin Auth0 on this live webinar as we unveil survey findings from your peers on:\n- Common mistakes generally made when app development teams decide to build vs buy identity--these are real mistakes made by real peers working to make identity solutions come to life for their app development teams.\n- Mistakes people made in the architecture surrounding an identity implementation. \n- And because identity is often a team sport - we will share which teams were most challenging and helpful to work with along the way.\n\nAt Auth0 we believe that your app development team deserves the best chance of success with any identity initiative, regardless of where you lie on the identity learning curve.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5voLKFCfvVJlqZNlN673Td","type":"Asset","createdAt":"2020-03-04T18:23:05.257Z","updatedAt":"2020-03-04T18:34:11.915Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":2,"locale":"en-US"},"fields":{"title":"mistakes_to_love_TC","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5voLKFCfvVJlqZNlN673Td/bcacfa91e0b22a5d37f3649f3ca0e99b/MistakesWebinarTwitterCard.jpeg","details":{"size":165767,"image":{"width":2400,"height":1260}},"fileName":"MistakesWebinarTwitterCard.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7cy5ech7DuJeMwn735AFUs","type":"Asset","createdAt":"2020-03-18T20:39:58.295Z","updatedAt":"2020-03-18T20:39:58.295Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Mistakes to Love (1)","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7cy5ech7DuJeMwn735AFUs/c91eaf9c55da11ba9dd86620f336b408/Mistakes_to_Love__1_.mp4","details":{"size":49102201},"fileName":"Mistakes to Love (1).mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5kdtIiSwLjroQK0rJbiX91","type":"Asset","createdAt":"2020-09-30T21:06:14.639Z","updatedAt":"2020-09-30T21:06:14.639Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Mistakes","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5kdtIiSwLjroQK0rJbiX91/661a94cfd4bb0a0943307cf0c30d6d14/resource_thumb_55.jpg","details":{"size":64917,"image":{"width":581,"height":388}},"fileName":"resource_thumb_55.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb26AAA-aPA4z000000011jGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:55.384Z","title":"How Authentication is the Gateway to your Digital Transformation","id":"digital-transformation-strategy-globant-auth0","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"n84dQMNpVdSVmcWr0E0BB","type":"Asset","createdAt":"2020-05-14T17:28:55.787Z","updatedAt":"2020-05-15T17:14:22.054Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":26,"revision":2,"locale":"en-US"},"fields":{"title":"auth0-globant-CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/n84dQMNpVdSVmcWr0E0BB/b321278a3fae4a87fe7c5028acbb5cff/auth0-globant_resource-cover__1_.png","details":{"size":131654,"image":{"width":600,"height":856}},"fileName":"auth0-globant_resource-cover (1).png","contentType":"image/png"}}},"description":"WEBINAR PRESENTED BY GLOBANT AND AUTH0\n\nShiven Ramji, Chief Product Officer at Auth0 and Paul Cullin, Tech Director at Globant detail how authentication and security management are essential for scaling your digital strategies fast. \n\nWatch the Live Webinar to Learn:\n- Why Authentication must be the foundation for your Digital Transformation roadmap.\n- How Authentication can accelerate your Digital Transformation in a time when organizations need to pivot quickly.\n- Choosing the right authentication tools for your organization. \n- How to show the business value from your Digital Transformation implementation. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"72x6EJ5iAhiPd660QAec3E","type":"Asset","createdAt":"2020-04-30T17:19:08.566Z","updatedAt":"2020-04-30T17:19:08.566Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"auth0-globant","file":{"url":"//images.ctfassets.net/2ntc334xpx65/72x6EJ5iAhiPd660QAec3E/d9442dc7b7888582963b556011ccc8ea/auth0-globant_share-asset_1_.jpg","details":{"size":156575,"image":{"width":2400,"height":1260}},"fileName":"auth0-globant_share-asset(1).jpg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5XlJaizVbavzDpCakZkqih","type":"Asset","createdAt":"2020-05-14T17:56:26.099Z","updatedAt":"2020-05-14T17:56:26.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"How Authentication is the Gateway to your Digital Transformation","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/5XlJaizVbavzDpCakZkqih/5d96df7f0dd8f59bcaac2b3f2d98a3b7/How_Authentication_is_the_Gateway_to_your_Digital_Transformation.mp4","details":{"size":413701072},"fileName":"How Authentication is the Gateway to your Digital Transformation.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5lEwDnPTTtqLTCw6AvFXfF","type":"Asset","createdAt":"2020-09-30T20:54:45.005Z","updatedAt":"2020-09-30T20:57:36.993Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"IAM Market","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5lEwDnPTTtqLTCw6AvFXfF/eba8bb891d9a6521e899af23df5824f7/resource_thumb_23.jpg","details":{"size":56154,"image":{"width":581,"height":388}},"fileName":"resource_thumb_23.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb2gAAA-aPA4z0000000123GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:55.079Z","title":"The Evolution of Digital Identities, Consent, \u0026 Cookies","id":"MLD-Auth0-Evolution-of-Digital-ID-and-Consent","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ShhEWdZqldEh3ZyiwSHoI","type":"Asset","createdAt":"2020-08-31T16:34:16.664Z","updatedAt":"2020-08-31T16:44:40.324Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"MLDWebinarupdated","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4ShhEWdZqldEh3ZyiwSHoI/24f0ed847b337ec795c20c3bd2b4c75c/MLDWebinarupdated.jpeg","details":{"size":56181,"image":{"width":600,"height":856}},"fileName":"MLDWebinarupdated.jpeg","contentType":"image/jpeg"}}},"description":"About this Webinar\nWEBINAR PRESENTED BY MYLIFE DIGITAL AND AUTH0\n\n\nIn today’s digital environment, the bar has been reset when it comes to remote working, e-commerce, e-learning, and streaming services. This webinar will explore how organisations have typically - and are now - approaching Identity and Access Management (IAM) adoption and implementation and the role that consent plays. Particularly as compliance requirements around consumer data evolve, the complexity of managing identities and consent to maintain security and trust are more important than ever.\n\nJoin MyLifeDigital and Auth0 as we discuss:\n\n- The value of centralising digital identities across applications and services\n- The power of APIs and extensibility\n- The consumer privacy paradox\n- Linking progressive profiling and consent\n- What that all means for an organisation - from developers to marketers - to have a joined up approach to managing your customers’ digital identities","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6XsUfwBamX2HWqQfKyVGgy","type":"Asset","createdAt":"2020-08-31T16:36:51.875Z","updatedAt":"2020-08-31T16:36:51.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"MLDShareimage","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6XsUfwBamX2HWqQfKyVGgy/1ab7de11ea947c5ca9853adb1e967058/MLDShareimage.jpeg","details":{"size":695214,"image":{"width":5000,"height":2625}},"fileName":"MLDShareimage.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7dz3dfIf4p4z0FurjykT9E","type":"Asset","createdAt":"2020-08-31T16:37:24.749Z","updatedAt":"2020-08-31T16:49:18.061Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"9qogt9p3nn","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7dz3dfIf4p4z0FurjykT9E/213b28b61356088939373727a2b1b9ba/The_Evolution_of_Digital_Identities__Consent_and_Cookies.mp4","details":{"size":39866667},"fileName":"The Evolution of Digital Identities, Consent and Cookies.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5foGrWYUZJ1KZ3eGLTlsBf","type":"Asset","createdAt":"2020-09-30T21:08:30.967Z","updatedAt":"2020-10-13T22:45:56.221Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Privacy settings","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5foGrWYUZJ1KZ3eGLTlsBf/c2d13362146c3685d5b801a81cb5ac70/consent_management_thumb.jpg","details":{"size":18137,"image":{"width":581,"height":388}},"fileName":"consent_management_thumb.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb3GAAQ-aPA4z000000012GGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:54.680Z","title":"Sign into the Hype","id":"sign-into-the-hype-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3uDEGm8hWyipkuXfVItz16","type":"Asset","createdAt":"2020-02-27T19:57:05.595Z","updatedAt":"2020-02-27T19:58:48.517Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"siwa","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3uDEGm8hWyipkuXfVItz16/68ef23d437c3e1d5e7f1f7e1c7501090/SIWAResource__1_.jpeg","details":{"size":45702,"image":{"width":600,"height":856}},"fileName":"SIWAResource (1).jpeg","contentType":"image/jpeg"}}},"description":"Sign in to the hype: How Apple is putting the spotlight on social logins \n\nSocial login has been around for a while now, with the likes of Google and Facebook sitting happily alongside the usual username-password authentication process. Despite this, it’s never historically been something people really discussed, let alone cared about. This all changed once Apple got involved late last year. When Sign in with Apple was launched, silence quickly turned to debate. From the importance of user privacy to the relationship between frictionless login and security, there has never been a more urgent time to know more about social logins.\n\nIn this webinar, we will help you get up to speed with the following:\n- The key differences between Google and Apple as social login providers, giving you the insight to make sure whatever you choose works for you\n- How to overcome the challenge of multiple user accounts when you integrate Sign in with Apple\n- Calling APIs without writing custom code, which helps save time and effort for dev teams\n\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3iIbaClralwRDhU9ba97ed","type":"Asset","createdAt":"2020-02-07T16:26:54.200Z","updatedAt":"2020-02-07T17:05:33.129Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":2,"locale":"en-US"},"fields":{"title":"rise-of-social-logins","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3iIbaClralwRDhU9ba97ed/d688bdf0fc5fee684a2a423f82c6ce47/SignInToTheHype_TwitterCard.jpeg","details":{"size":128894,"image":{"width":2400,"height":1260}},"fileName":"SignInToTheHype_TwitterCard.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2NZvVV8Ol4a2Wd4YQgjh24","type":"Asset","createdAt":"2020-02-27T19:52:03.284Z","updatedAt":"2020-02-27T19:52:03.284Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":1,"locale":"en-US"},"fields":{"title":"the_rise_of_social_login","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/2NZvVV8Ol4a2Wd4YQgjh24/b0e04b7b3d97fb88eae5fb0c0193c758/Rise_of_Social_Logins.mp4","details":{"size":53370632},"fileName":"Rise of Social Logins.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2sN7QtmrEmARGxwSYM2JiF","type":"Asset","createdAt":"2020-09-30T21:03:10.268Z","updatedAt":"2020-09-30T21:03:10.268Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Apple hype","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2sN7QtmrEmARGxwSYM2JiF/abab384930c90ef15b0faf53bb52db29/resource_thumb_74.jpg","details":{"size":48170,"image":{"width":581,"height":388}},"fileName":"resource_thumb_74.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb2WAAQ-aPA4z000000011rGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:54.259Z","title":"The Power of a Centralized Identity Strategy","id":"centralized-identity-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ulKxRlTjXWJZOu1On3oYo","type":"Asset","createdAt":"2020-02-26T23:17:26.160Z","updatedAt":"2020-04-20T19:27:16.421Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"centralized-identity-webinar","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ulKxRlTjXWJZOu1On3oYo/1af305c89f9ee1897666948cfd6e2275/Resource_covers.png","details":{"size":698713,"image":{"width":600,"height":856}},"fileName":"Resource covers.png","contentType":"image/png"}}},"description":"A typical company today has dozens or even hundreds of applications. Some are legacy; some are new but quickly become legacy. To be more efficient, developers often adopt a service-oriented architecture, where common capabilities are compartmentalized and serve every application.\n\nIdentity is a prime candidate for this type of centralization, but because of certain business requirements, some Auth0 customers still have separate identity implementations for many of their applications. This leads to:\n\n- Multiple silos of user credentials\n- An increased risk of a data breach\n- Personally identifiable information (PII) spread across too many systems\n- A poor customer experience (where users have to authenticate multiple times and often)\n\nIdentity teams end up with an ever-growing backlog of important regulations, user demands, and security concerns.\n\nCentralizing your identity increases development velocity, improves user experience, and reduces security exposure. Join Carlos Mostek, Principal Solution Architect at Auth0, to learn:\n\n- Why centralizing identity is critical to improving UX and security\n- The benefits of centralizing identity with Auth0\n- What initiatives you should consider to take your Auth0 implementation to the next level","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5vJP8ib40Wlfc7zndSGTNV","type":"Asset","createdAt":"2020-02-07T22:25:13.342Z","updatedAt":"2020-02-07T22:25:13.342Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"centralized-identity","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5vJP8ib40Wlfc7zndSGTNV/83772cd7feca8d957ee9dfb0781bcd36/Webinar-twitter-card.png","details":{"size":3127786,"image":{"width":2400,"height":1260}},"fileName":"Webinar-twitter-card.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"78QvFGVrt88xQecKKj3h8s","type":"Asset","createdAt":"2020-02-26T23:23:54.372Z","updatedAt":"2020-02-26T23:26:34.497Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"centralized-identity-webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/78QvFGVrt88xQecKKj3h8s/39cba61ca44ed479dbb268e0058b4572/The_Power_of_a_Centralized_Identity_Strategy.mp4","details":{"size":65604567},"fileName":"The Power of a Centralized Identity Strategy.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6oOYd0OYo6Il1Rn335E0mV","type":"Asset","createdAt":"2020-09-30T21:01:21.830Z","updatedAt":"2020-09-30T21:01:21.830Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Centralized Identity Strategy","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6oOYd0OYo6Il1Rn335E0mV/558da81e6e75bfa1e427221f53d0b7ce/resource_thumb_28.jpg","details":{"size":175620,"image":{"width":581,"height":388}},"fileName":"resource_thumb_28.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb2UAAQ-aPA4z000000011pGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:53.973Z","title":"Building IDaaS at Scale","id":"Building-IDaaS-at-Scale","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"41407B1mMbwhDTHxJMRZxc","type":"Asset","createdAt":"2019-11-22T18:21:07.588Z","updatedAt":"2019-11-22T18:21:07.588Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"cover how-to-build-idaas-at-scale","file":{"url":"//images.ctfassets.net/2ntc334xpx65/41407B1mMbwhDTHxJMRZxc/e3e1da2ffa05078a75b8b7b4c8079780/cover_how-to-build-idaas-at-scale_2x.png","details":{"size":122166,"image":{"width":600,"height":856}},"fileName":"cover_how-to-build-idaas-at-scale@2x.png","contentType":"image/png"}}},"description":"In recent years, we’ve seen the emergence of a new form of technology scale. Today's emerging technologies - which rapidly grow to millions of users, do not sell a product or service. Instead, they build a platform on which others can create value. \n\nYet new platforms often fail because the design and growth strategies involved in building them are complex, resource-intensive and expensive to scale. Even in the IAM/ CIAM space, many companies are still building their own internal IDaaS platform, facing this massive challenge, and oftentimes failing to achieve their goals. \n\nJoin Christian McCarrick, VP of Engineering, as he discusses the complexities, resources, and scalability challenges Auth0 has faced in creating an IDaaS platform that securely manages more than 2.5 billion logins per month. He will take a deep dive into specific scenarios including: scaling password hashing, designing across multiple clouds, and session hijacking.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4scZ3xur8uPI8rIwCHMUkp","type":"Asset","createdAt":"2019-11-08T15:39:02.488Z","updatedAt":"2019-11-08T15:39:02.488Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Building-IDaaS-at-Scale","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4scZ3xur8uPI8rIwCHMUkp/875d15f708ed5163880db74b8abbe055/TC_Building-IDaaS-at-Scale_.png","details":{"size":1626418,"image":{"width":2400,"height":1260}},"fileName":"TC_Building-IDaaS-at-Scale .png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3WG0dsKD9wmRz8XJAd94e1","type":"Asset","createdAt":"2019-11-22T21:09:08.361Z","updatedAt":"2019-11-22T21:09:08.361Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"locale":"en-US"},"fields":{"title":"Building IDaaS at Scale - Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3WG0dsKD9wmRz8XJAd94e1/c8709ee598e96a430523a9b0e413d477/Building_IDaaS_at_Scale_-_Session_1.mp4","details":{"size":55536401},"fileName":"Building IDaaS at Scale - Session 1.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"138KZzcSP1OtiYcKfoTXFz","type":"Asset","createdAt":"2020-09-30T21:00:11.190Z","updatedAt":"2020-09-30T21:00:11.190Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"IDaaS at Scale","file":{"url":"//images.ctfassets.net/2ntc334xpx65/138KZzcSP1OtiYcKfoTXFz/98d39914e2ce5c191010d0127de2b3a9/resource_thumb_56.jpg","details":{"size":69717,"image":{"width":581,"height":388}},"fileName":"resource_thumb_56.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb1wAAA-aPA4z000000011ZGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:53.668Z","title":"Sign in with Apple","id":"sign-in-with-apple","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"11FqdFbhdwkyq8lhEsMQuK","type":"Asset","createdAt":"2019-10-18T15:28:39.246Z","updatedAt":"2019-11-06T11:20:15.886Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":41,"revision":4,"locale":"en-US"},"fields":{"title":"Are you ready to Sign In with Apple ID?","file":{"url":"//images.ctfassets.net/2ntc334xpx65/11FqdFbhdwkyq8lhEsMQuK/ee1515269fcea4080ca4eaf98d194b46/Cover_Are_you_ready_to_Sign_In_with_Apple_ID__2x-8__1_.png","details":{"size":48391,"image":{"width":600,"height":856}},"fileName":"Cover_Are you ready to Sign In with Apple ID_@2x-8 (1).png","contentType":"image/png"}}},"description":"Sign in with Apple was announced at WWDC this past June and caused quite a commotion about what it means for developers who implement it, and end users who benefit from it.\n\nAs part of iOS 13, Sign in with Apple will serve as a new upstream identity provider that app developers will include in their applications to offer a frictionless sign-in experience with Touch ID and Face ID, as well as address privacy concerns around apps that share customer data through social logins.\n\nApps that exclusively use a third-party or social login service (such as Facebook Login, Google Sign-in, Sign in with Twitter, etc.) to set up or authenticate the user’s primary account with the app must also offer Sign in with Apple as an equivalent option.\n\nAs a result, developers are tasked with integrating this feature into their apps, or risk rejection or removal of any apps that do not comply.\n\nWhat does this mean for logins moving forward? That a flexible identity platform is no longer a nice-to-have, but a need-to-have for responding to rapid market changes and the urgent demand by consumers to have the most seamless login possible. This webinar will cover Sign in with Apple highlights, how to easily implement it into apps, and why your identity management solution matters.\n\nJoin Auth0 in this webinar to learn:\n\n- Sign in with Apple login flows for native and web-based applications\n- The ease of integration for any third-party social identity providers\n- How to leverage Auth0’s extensibility features to support multiple Identity Providers","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1s54TtrrFaR99pNbwWdBnb","type":"Asset","createdAt":"2019-10-18T15:33:23.680Z","updatedAt":"2019-11-06T11:20:14.877Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":2,"locale":"en-US"},"fields":{"title":"Are you ready to Sign In with Apple?","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1s54TtrrFaR99pNbwWdBnb/fc82d848343f61791a69bacfc34ba0b4/TC_Are_you_ready_to_Sign_In_with_Apple_ID__2x-8__1_.png","details":{"size":286977,"image":{"width":2400,"height":1260}},"fileName":"TC_Are you ready to Sign In with Apple ID_@2x-8 (1).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3266d0OVKJ6Z7X0c04EGgI","type":"Asset","createdAt":"2019-10-18T15:36:16.991Z","updatedAt":"2019-11-06T11:41:39.351Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":4,"locale":"en-US"},"fields":{"title":"Sign in with Apple - Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3266d0OVKJ6Z7X0c04EGgI/310ac62b55703c2aeb09dbd98fda27e1/Sign_In_With_Apple_-_Yvo_Amit_Rachael.mp4","details":{"size":53252647},"fileName":"Sign In With Apple - Yvo\u0026Amit\u0026Rachael.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"qOHrSKDfNppf6xBzC0PKG","type":"Asset","createdAt":"2020-09-30T20:59:28.690Z","updatedAt":"2020-09-30T20:59:28.690Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Apple","file":{"url":"//images.ctfassets.net/2ntc334xpx65/qOHrSKDfNppf6xBzC0PKG/49ed84e84093696b0a6b421685bfb78a/resource_thumb_63.jpg","details":{"size":46193,"image":{"width":581,"height":388}},"fileName":"resource_thumb_63.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb1vAAA-aPA4z000000011YGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:02.742Z","title":"Intro to OpenID Connect","id":"intro-openid-connect","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4v8iVMpoHC8cSsUKIQgUow","type":"Asset","createdAt":"2018-03-06T15:32:41.795Z","updatedAt":"2019-11-06T11:24:06.893Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Webinars Introduction to OpenID","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4v8iVMpoHC8cSsUKIQgUow/eafc1addfe7a1831a84d1a3adfe5ee51/Webinars_Introduction_to_OpenID.png","details":{"size":222532,"image":{"width":600,"height":856}},"fileName":"Webinars_Introduction to OpenID.png","contentType":"image/png"}}},"description":"What is OpenID Connect, how does it work and why should you care? Watch this 30 minute webinar tutorial to understand this new protocol based on OAuth 2.0 and its benefits. Last of all, you'll also learn how to quickly and easily integrate it in your app.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3vpUkVUGHKwCO28iSomSWm","type":"Asset","createdAt":"2018-03-06T15:34:34.304Z","updatedAt":"2019-11-06T11:22:29.939Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"intro-openid-connect-card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3vpUkVUGHKwCO28iSomSWm/17c80c0688f14312ec4df95b9cbc6cae/intro-openid-connect-card.png","details":{"size":404259,"image":{"width":2400,"height":1260}},"fileName":"intro-openid-connect-card.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1RxHGNI2Ww6ikokCEeAKW8","type":"Asset","createdAt":"2018-03-06T15:34:33.676Z","updatedAt":"2019-11-06T11:42:09.769Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"locale":"en-US"},"fields":{"title":"intro-openid-connect","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1RxHGNI2Ww6ikokCEeAKW8/300d06e4c37e05ee455358c8f001f622/intro-openid-connect.mp4","details":{"size":86275184},"fileName":"intro-openid-connect.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"jtyCnjb9GekJSpiNVcZQC","type":"Asset","createdAt":"2020-09-29T18:29:08.312Z","updatedAt":"2020-09-29T18:29:08.313Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Intro to OpenID Connect","file":{"url":"//images.ctfassets.net/2ntc334xpx65/jtyCnjb9GekJSpiNVcZQC/9e20631f5055645b3c73cd298b7a9e3d/resource_thumb_7.jpg","details":{"size":37473,"image":{"width":581,"height":388}},"fileName":"resource_thumb_7.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb7TAAQ-aPA4z000000015RGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:02.043Z","title":"Make Remote Work","id":"make-remote-work-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3NvGJupnpMWI7qTr7Kcp1i","type":"Asset","createdAt":"2020-04-27T17:03:02.485Z","updatedAt":"2020-04-27T22:38:14.390Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":4,"locale":"en-US"},"fields":{"title":"make-remote-work-ci","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3NvGJupnpMWI7qTr7Kcp1i/d23161610bbb60f34c8d5d84e3bc8c74/MakeRemoteWorkGC2.jpeg","details":{"size":54964,"image":{"width":600,"height":856}},"fileName":"MakeRemoteWorkGC2.jpeg","contentType":"image/jpeg"}}},"description":"Remote work is becoming more common now than ever before. While this can be scary for companies, managers and remote workers alike, it doesn’t have to be. \n\nTake it from Auth0. Born as a globally distributed organization initially out of necessity, we’ve tried and tested (and sometimes failed, then corrected) strategies for making remote work successful from day one. Currently, less than 30% of the Auth0 team works out of the Bellevue headquarters and more than 50% work from home. We’ve seen that remote work requires buy-in from the entire company and effort from everyone to improve the processes that make remote work, work. But done effectively, remote work can be a supercharger for performance and a differentiator in times of change. \n\nJoin Auth0’s Co-Founder and CTO, Matias Woloski and Chief of Staff, Ari Schapiro for a deep dive into our recipe for creating a remote-friendly culture. We’ll discuss best practices on:\nCommunicating to collaborate, across channels and time zones\n\n- Promoting social engagement to combat isolation,\n- Establishing trust between peers, teams, and managers, \n- Building culture and values when you’re not together,\n- Productivity hacks for building individual remote-friendly habits, \n- How to optimize IT and tooling to give employees flexibility without sacrificing security. \n \nIn today's digital age, there’s no longer a need to be co-located in order to get things done. Discover what’s allowed Auth0 to build an awesome remote team, work effectively, and stay 100% productive no matter where our team members are. ","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3js9t2ENoELAHxadXMg1f6","type":"Asset","createdAt":"2020-04-27T17:14:16.366Z","updatedAt":"2020-04-27T22:42:59.728Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":26,"revision":2,"locale":"en-US"},"fields":{"title":"make-remote-work-sa","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3js9t2ENoELAHxadXMg1f6/72e5f596abc5b4f5fd67150acb133765/MakeRemoteWorkTwitter2.jpeg","details":{"size":130596,"image":{"width":2400,"height":1260}},"fileName":"MakeRemoteWorkTwitter2.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"fxrP1E1MF7vprNI2KsRCu","type":"Asset","createdAt":"2020-04-27T17:11:59.706Z","updatedAt":"2020-04-27T17:11:59.706Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"locale":"en-US"},"fields":{"title":"make-remote-work","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/fxrP1E1MF7vprNI2KsRCu/e86ba723fabcdcb0575b086ffd30b883/Make_Remote_Work___1_.mp4","details":{"size":1190055443},"fileName":"Make Remote Work (1).mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2E9K4k35TqT9BbfAwscsY8","type":"Asset","createdAt":"2020-09-29T18:26:04.950Z","updatedAt":"2020-09-29T18:26:04.950Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Make Remote Work","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2E9K4k35TqT9BbfAwscsY8/ebe7a9657158ad3a28aaa65095485d7d/resource_thumb_81.jpg","details":{"size":55553,"image":{"width":581,"height":388}},"fileName":"resource_thumb_81.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb2bAAA-aPA4z000000011yGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:09:01.620Z","title":"Attract and Retain More Customers with CIAM Technology","id":"attract-and-retain-more-customers-with-ciam-technology","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3MqOmALQ7kTdKlzFsUcSec","type":"Asset","createdAt":"2020-09-22T23:46:53.263Z","updatedAt":"2020-09-22T23:46:53.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Attract and Retain More customers with CIAM Tech Resources cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3MqOmALQ7kTdKlzFsUcSec/c266260699e339777581af8b428c33f0/Resources_Page__Cover__2_.jpeg","details":{"size":72728,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (2).jpeg","contentType":"image/jpeg"}}},"description":"Consumers are now accessing gated content, customer portals or smart devices in ways and at a scale never seen before. The most successful companies aren’t just focused on providing secure, seamless and painless access for the end-user. They’re also passionate about delivering a customer experience that will help them drive growth. And it starts at the login box.\n\nJoin Auth0 and Scaled Access as we discuss digital identity \u0026 access management for real-world interactions. We address key topics, such as:\n\n- How to let organizations offer personalized access to different stakeholders in extended ecosystems.\n- How to authorize end-users to give access to others. Without sharing their credentials.\n- How to simplify access from multiple devices to multiple services.\n- How to build trust when asking for personal data.\n- How to outsmart competition with a single vision of the customer together with insights on their relationships and activity\n\nRegardless of whether you decided to build or buy IAM, this webinar will provide you with practical insights, based on customer use cases in media, utilities and finance, because we believe your development team deserves the best chance of success with any identity or authorization initiative.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XfZ0mAnLV2SnvCZXz2ucY","type":"Asset","createdAt":"2020-09-22T23:46:58.249Z","updatedAt":"2020-09-22T23:46:58.249Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM Technology Share asset","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2XfZ0mAnLV2SnvCZXz2ucY/8e2f37bfb4f12b58e1aaed639a328573/Resources_Page__Share_Asset__1_.jpeg","details":{"size":84407,"image":{"width":1200,"height":630}},"fileName":"Resources Page_ Share Asset (1).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"33QZZLS5MCMBxcP6CTJqPN","type":"Asset","createdAt":"2020-09-22T23:47:05.308Z","updatedAt":"2020-09-22T23:47:05.308Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Attract and Retain Customers with CIAM Technology Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/33QZZLS5MCMBxcP6CTJqPN/7aeae3ae591ad8a45bf4ef72d68189ee/Attract_and_Retain_Customers_with_CIAM_Technology_Webinar.mp4","details":{"size":49815258},"fileName":"Attract and Retain Customers with CIAM Technology Webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HZnWsf8N15kX4QrP603Mh","type":"Asset","createdAt":"2020-09-29T18:20:36.745Z","updatedAt":"2020-09-29T18:20:36.746Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM technology","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HZnWsf8N15kX4QrP603Mh/bd169c65ae3684f45fbdd4c04072c342/resource_thumb_5.jpg","details":{"size":43394,"image":{"width":581,"height":388}},"fileName":"resource_thumb_5.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb3TAAQ-aPA4z000000012VGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:01.200Z","title":"Live Demo: Auth0 for B2B Identity Management","id":"auth0-b2b-identity-management-demo","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XmhksW14yGiIHoIa81NU4","type":"Asset","createdAt":"2020-09-10T22:36:20.013Z","updatedAt":"2020-09-10T23:01:38.786Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"B2Bdemo","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2XmhksW14yGiIHoIa81NU4/308a9060b1292d13eb27acd9127771eb/B2Bdemo__1_.jpeg","details":{"size":52105,"image":{"width":600,"height":856}},"fileName":"B2Bdemo (1).jpeg","contentType":"image/jpeg"}}},"description":"On-Demand Webinar Presented by Auth0\n\nUsing Auth0, developers can connect any application written in any language or stack, and define the external identity providers, as well as integrations, that they want to use.\n\nFill out the form for an overview of this process. We’ll touch upon Auth0’s unmatched extensibility and its specific applicability to B2B use cases.\n\nThe demo will showcase how you can:\n- Create a branded and consistent experience across all applications\n- Onboard and manage customers and business partners\n- Deliver a better and frictionless user experience by turning on federated authentication for enterprise users\n- Enable multi-factor authentication, anomaly detection, and more with the flip of a switch\n- Assign RBAC authorization policies to users to allow for different permissions within your application\n\nIf you’ve ever tried to build your own identity solution before, you know it can be complex, expensive and difficult. So don’t. Increase revenue, minimize risk, and reduce the sales cycle with Auth0.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"AvsHM1TN5B0gbATk0xwew","type":"Asset","createdAt":"2020-08-25T18:51:19.708Z","updatedAt":"2020-08-25T19:09:37.959Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"B2B Demo Share","file":{"url":"//images.ctfassets.net/2ntc334xpx65/AvsHM1TN5B0gbATk0xwew/7d9903caede746077d64655d986e830e/B2B_Demo_Share.jpeg","details":{"size":173129,"image":{"width":2400,"height":1260}},"fileName":"B2B Demo Share.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5A6wl25nvDYPYRR5mH8Ll1","type":"Asset","createdAt":"2020-09-10T22:43:51.607Z","updatedAt":"2020-09-10T22:43:51.607Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Demo Webinar","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/5A6wl25nvDYPYRR5mH8Ll1/63144693b14251fd196a254afecf1685/Demo_Webinar_.mp4","details":{"size":85622830},"fileName":"Demo Webinar .mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5VNsNUThjXIpxITVz4NVg2","type":"Asset","createdAt":"2020-09-29T16:54:25.768Z","updatedAt":"2020-09-29T16:54:25.768Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"B2B Demo Thumb","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5VNsNUThjXIpxITVz4NVg2/9743b6d98bcfd09462f1751cee2a5b0c/resource_thumb_1.jpg","details":{"size":45769,"image":{"width":581,"height":388}},"fileName":"resource_thumb_1.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb3SAAQ-aPA4z000000012UGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:09:00.434Z","title":"The Anatomy of a Credential Stuffing Attack","id":"credential-stuffing-attack-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4p61xqyh7fF4vxOUJ6fTpZ","type":"Asset","createdAt":"2020-04-28T23:50:02.640Z","updatedAt":"2020-04-28T23:50:02.640Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"locale":"en-US"},"fields":{"title":"CI","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4p61xqyh7fF4vxOUJ6fTpZ/e81845d7090e54209403800c76a0bbed/webnar_anatomy_cred_stuffing_cover__1_.png","details":{"size":175351,"image":{"width":600,"height":856}},"fileName":"webnar_anatomy_cred_stuffing_cover (1).png","contentType":"image/png"}}},"description":"As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.\n\nIn credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to [Google](https://www.forbes.com/sites/daveywinder/2019/02/05/google-reveals-a-big-problem-with-passwords-on-safer-internet-day/#696162f95e0b). On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don't have the right preventative measures in place.\n\nJoin Jamie Hughes, Lead Solutions Engineer, to learn:\n-How credential stuffing attacks work\n-What effect they can have on your company\n-How Auth0 can help you detect and mitigate these attacks","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"33t5KE0QciIEAMilsd3bsI","type":"Asset","createdAt":"2020-04-28T23:50:47.657Z","updatedAt":"2020-04-28T23:50:47.657Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"sa","file":{"url":"//images.ctfassets.net/2ntc334xpx65/33t5KE0QciIEAMilsd3bsI/d82b9bb6640e3c7038acb76c62aa0f63/webnar_anatomy_cred_stuffing_TC__3_.png","details":{"size":550527,"image":{"width":2400,"height":1260}},"fileName":"webnar_anatomy_cred_stuffing_TC (3).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7wUyZZvtEE0wdQBPrrVCBG","type":"Asset","createdAt":"2020-04-28T23:51:39.610Z","updatedAt":"2020-04-28T23:51:39.610Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":1,"locale":"en-US"},"fields":{"title":"anatomy-of-credential-stuffing-attack","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7wUyZZvtEE0wdQBPrrVCBG/db6fef45d2f792eb33a86d245f1709ef/2020-04-21_10.56_The_Anatomy_of_a_Credential_Stuffing_Attack.mp4","details":{"size":101884829},"fileName":"2020-04-21 10.56 The Anatomy of a Credential Stuffing Attack.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","ocid":"7014z000001cb2ZAAQ-aPA4z000000011wGAA"},{"type":"webinars","updatedAt":"2022-01-27T21:12:12.549Z","title":"How login can protect accounts from phishing and credential threat","id":"wwpass-auth0-joint-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5eebZw9vVE7mHzS9ugno0A","type":"Asset","createdAt":"2022-01-27T20:55:13.476Z","updatedAt":"2022-01-27T20:56:37.368Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"locale":"en-US"},"fields":{"title":"How login can protect accounts from phishing and credential threat","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5eebZw9vVE7mHzS9ugno0A/78ac7d088450b0250e1d9896e07574ce/WWpass_Webinar_Cover.jpeg","details":{"size":58470,"image":{"width":600,"height":856}},"fileName":"WWpass Webinar Cover.jpeg","contentType":"image/jpeg"}}},"description":"### __About this Webinar__\nGood security starts at your login screen. Leverage next-gen authentication to significantly improve security of access, remove overhead associated with password resets, and simplify UE for end users.\n\nAuth0 and WWPass Identity Provider offer a game-changing approach to multi-factor authentication utilizing OpenID Connect and Oauth2 to replace insecure usernames and passwords. The technology uses a patented distributed credential storage to protect regular and privileged accounts from all types of credential and hacker attacks. The solution maintains a balance between low cost and simple login with mobile phone app and ultra-secure access with hardware tokens, which eliminates the possibility of unauthorized remote access with stolen credentials.\n\n### __In this session, we will cover:__\n- Comparing traditional logins and MFAs to WWPass login. Main differentiators and benefits.\n- Integration of WWPass authentication to Auth0 CIAM.\n- Technical DEMO.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZCK48sliYlDIlD3wwNmtT","type":"Asset","createdAt":"2022-01-27T20:55:56.709Z","updatedAt":"2022-01-27T20:55:56.709Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How login can protect accounts from phishing and credential threat","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZCK48sliYlDIlD3wwNmtT/f7cf33695ae0851a55820245e43fc2e0/WWpass_Webinar_Share_Asset.jpeg","details":{"size":1237798,"image":{"width":5000,"height":2432}},"fileName":"WWpass Webinar Share Asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4vojIwv7mRsouBGlLkiajd","type":"Asset","createdAt":"2022-01-27T20:57:31.322Z","updatedAt":"2022-01-27T20:57:31.322Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"How login can protect accounts from phishing and credential threat","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4vojIwv7mRsouBGlLkiajd/e569fb45b17bc5fecad50edd89ddc590/GMT20220120-185826_Recording_1920x1080.mp4","details":{"size":70237825},"fileName":"GMT20220120-185826_Recording_1920x1080.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"EN"},{"type":"webinars","updatedAt":"2021-12-01T18:46:46.329Z","title":"Architecture \u0026 Identity Part I: 3 IAM Examples","id":"3-iam-examples","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3O3M1mSU6A8UGKSmiscic4","type":"Asset","createdAt":"2018-04-16T20:12:17.424Z","updatedAt":"2019-11-06T11:21:54.367Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":3,"locale":"en-US"},"fields":{"title":"Architecture and Identity Part 1 cover image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3O3M1mSU6A8UGKSmiscic4/3a57f8b8ddc7e59faceb3553bdd010e7/Architecture_and_Identity_I__1_.png","details":{"size":302791,"image":{"width":600,"height":856}},"fileName":"Architecture and Identity I (1).png","contentType":"image/png"}}},"description":"### Featuring Jared Hanson, creator of Passport JS and Auth0 Chief Architect\n\nJared will walk through 3 Identity Access Management (IAM) architecture examples and discuss the specific pros and cons of each in supporting digital transformation efforts. Get immediate access to the on-demand webinar, presented by Auth0, an identity platform that helps companies including Atlassian, VMware and Mazda modernize their identity systems without compromising on speed, security or innovation.\n\nCompanies that have traditionally viewed IAM as a function of IT — limited to things like user provisioning, Single Sign On and password management — are now coming to terms with the much larger role identity plays, both as a risk and differentiator. Watch now, on-demand.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3gNaaQr7MAgeSOCy2SgWGi","type":"Asset","createdAt":"2018-04-13T16:28:49.996Z","updatedAt":"2019-11-06T11:21:56.303Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":3,"locale":"en-US"},"fields":{"title":"3 IAM Examples Recording Twitter Card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3gNaaQr7MAgeSOCy2SgWGi/a8c1413907f71bd0e7d5a05c3e0942a2/tc1.png","details":{"size":856055,"image":{"width":2400,"height":1260}},"fileName":"tc1.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3XDIXJATHWAKM442Y26euu","type":"Asset","createdAt":"2018-03-12T16:28:35.271Z","updatedAt":"2019-11-06T11:42:04.264Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":3,"locale":"en-US"},"fields":{"title":"3 IAM examples","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3XDIXJATHWAKM442Y26euu/7c8c3f0132a1d61481f207470c76cc08/23225326b6c4aeadac2533ce5ce91eef7b166aec.mp4","details":{"size":31751100},"fileName":"23225326b6c4aeadac2533ce5ce91eef7b166aec.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6uRpZQzbjjnlmbwo2LgVQN","type":"Asset","createdAt":"2020-09-29T22:58:37.533Z","updatedAt":"2020-09-29T22:58:37.533Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Architecture \u0026 Identity","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6uRpZQzbjjnlmbwo2LgVQN/e55a9ad7952a39579f1ff5fd09cae73a/resource_thumb_67.jpg","details":{"size":38839,"image":{"width":581,"height":388}},"fileName":"resource_thumb_67.jpg","contentType":"image/jpeg"}}}},{"type":"webinars","updatedAt":"2021-05-13T23:21:59.403Z","title":"The Jobs-to-be-Done (JTBD) Framework","id":"the-jobs-to-be-done-framework","marketo_form_id":-23,"image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2NAfTAptD24qwSMa2ga4yC","type":"Asset","createdAt":"2018-03-12T14:41:07.235Z","updatedAt":"2019-11-06T11:22:12.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":2,"locale":"en-US"},"fields":{"title":"Jobs to be done","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2NAfTAptD24qwSMa2ga4yC/6e35c49a62854750216ad1cd85daf81b/webinars_jted.png","details":{"size":234229,"image":{"width":600,"height":856}},"fileName":"webinars_jted.png","contentType":"image/png"}}},"description":"What's the hype about? Jobs-to-be-Done is a framework that focuses on understanding the details of problems related to your solution or product. This requires answering questions like: who do we talk with, what do we ask them, and what information is most important.\n\nWhen used properly, the JTBD framework positions product managers to greatly increase the success of the products they develop – because the products are solving a real job the customer has in a way the customer recognizes as being most valuable. Watch now, on-demand.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1E3J2MIT4YyYKk40UYcsuQ","type":"Asset","createdAt":"2018-03-12T16:35:07.959Z","updatedAt":"2019-11-06T11:22:10.582Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":2,"locale":"en-US"},"fields":{"title":"Jobs to be done - Twitter card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1E3J2MIT4YyYKk40UYcsuQ/17df4afcee0b9d492826450c77b67ec0/16.png","details":{"size":687169,"image":{"width":2400,"height":1260}},"fileName":"16.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"35Xll6gJTOOeogKQk6QGgA","type":"Asset","createdAt":"2018-03-12T16:23:25.262Z","updatedAt":"2019-11-06T11:42:03.743Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":4,"locale":"en-US"},"fields":{"title":"Jobs to be done","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/35Xll6gJTOOeogKQk6QGgA/857e601da0fa7477ca278df2f636e8d8/c9176b17ffc680c7fb837ba5edb40cd39459e2c9.mp4","details":{"size":155186147},"fileName":"c9176b17ffc680c7fb837ba5edb40cd39459e2c9.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"KCpJVDxHDYObdxQ0diYLQ","type":"Asset","createdAt":"2021-05-13T23:21:53.237Z","updatedAt":"2021-05-13T23:21:53.237Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"resource thumb 6","file":{"url":"//images.ctfassets.net/2ntc334xpx65/KCpJVDxHDYObdxQ0diYLQ/3cb41df3a8b2168925a8d0ff0c2b300d/resource_thumb_6.jpg","details":{"size":52362,"image":{"width":581,"height":388}},"fileName":"resource_thumb_6.jpg","contentType":"image/jpeg"}}}},{"type":"webinars","updatedAt":"2020-09-30T21:09:47.617Z","title":"Risks Posed by Legacy Authentication","id":"risks-posed-by-legacy-authentication","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XfKcgkIs0QU8GkEGMEAkK","type":"Asset","createdAt":"2018-03-06T15:32:28.525Z","updatedAt":"2019-11-06T11:24:20.120Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Whitepapers 451 Research Risks Posed by Legacy Authentication","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2XfKcgkIs0QU8GkEGMEAkK/62720c7e5fd969598071e247e8518401/Whitepapers_451_Research__Risks_Posed_by_Legacy_Authentication.png","details":{"size":379561,"image":{"width":600,"height":856}},"fileName":"Whitepapers_451 Research_ Risks Posed by Legacy Authentication.png","contentType":"image/png"}}},"description":"For many, the path to modern authentication seems difficult and expensive, while others worry about the impact on user experience. Watch this webinar recording that explores this paradox and discuss practices for making secure, modern authentication fast and easy for developers and simple and frictionless for users.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3ntZmyin7yWeMAC2iakMGu","type":"Asset","createdAt":"2018-03-06T15:34:30.589Z","updatedAt":"2019-11-06T11:22:25.125Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"risks-posed-by-legacy-authentication-card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3ntZmyin7yWeMAC2iakMGu/d822e71d5866b434de71d79e1ecacb90/risks-posed-by-legacy-authentication-card.png","details":{"size":467582,"image":{"width":2400,"height":1260}},"fileName":"risks-posed-by-legacy-authentication-card.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"IRGq4Z92sEkgEsMSY2emu","type":"Asset","createdAt":"2018-03-06T15:34:29.906Z","updatedAt":"2019-11-06T11:42:11.478Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"locale":"en-US"},"fields":{"title":"Risks Posed by Legacy Authentication","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/IRGq4Z92sEkgEsMSY2emu/639e6ecff61a0d8f6eef6487db9cf19a/video_1484761766.mp4","details":{"size":290442592},"fileName":"video_1484761766.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"release_details":["Trends in securing cloud-based IT environments.","Why password authentication is a security risk.","Advantages and disadvantages to various authentication methods, username/password, single sign-on, multifactor, biometrics and social.","How to implement secure modern authentication without sacrificing user experience."],"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HZnWsf8N15kX4QrP603Mh","type":"Asset","createdAt":"2020-09-29T18:20:36.745Z","updatedAt":"2020-09-29T18:20:36.746Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM technology","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HZnWsf8N15kX4QrP603Mh/bd169c65ae3684f45fbdd4c04072c342/resource_thumb_5.jpg","details":{"size":43394,"image":{"width":581,"height":388}},"fileName":"resource_thumb_5.jpg","contentType":"image/jpeg"}}}},{"type":"webinars","updatedAt":"2020-09-29T22:55:13.976Z","title":"Legacy Authentication Is Not Enough","id":"legacy-authentication-is-not-enough","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13aNOPrNYMEmW2kwcCAqeW","type":"Asset","createdAt":"2018-03-06T15:32:42.221Z","updatedAt":"2019-11-06T11:24:08.462Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"Webinars Legacy Authentification Is Not","file":{"url":"//images.ctfassets.net/2ntc334xpx65/13aNOPrNYMEmW2kwcCAqeW/ec020c4c260d0761a4b046e4140506c5/Webinars_Legacy_Authentification_Is_Not.png","details":{"size":318007,"image":{"width":600,"height":856}},"fileName":"Webinars_Legacy Authentification Is Not.png","contentType":"image/png"}}},"description":"Building modern authentication goes beyond usernames and passwords. It should provide a framework for managing identity. In this webinar, James Governor, RedMonk Founder \u0026 Analyst and Auth0, will discuss best practices for development teams implementing modern authentication that’s better and faster.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6eTCBMPkisECKYWywe4Y2Y","type":"Asset","createdAt":"2018-03-06T15:34:32.175Z","updatedAt":"2019-11-06T11:22:32.481Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"legacy-authentication-is-not-enough-card","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6eTCBMPkisECKYWywe4Y2Y/438cbf4ac12d21de53a89f523b3fd2c8/legacy-authentication-is-not-enough-card.png","details":{"size":474490,"image":{"width":2400,"height":1260}},"fileName":"legacy-authentication-is-not-enough-card.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4RwdQEfjReKc68auQIOESW","type":"Asset","createdAt":"2018-03-06T15:34:30.995Z","updatedAt":"2019-11-06T11:42:10.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"locale":"en-US"},"fields":{"title":"legacy-authentication-is-not-enough","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4RwdQEfjReKc68auQIOESW/fa55f0bbb667eb3caade63d16f0582dd/legacy-authentication-is-not-enough.mp4","details":{"size":92753496},"fileName":"legacy-authentication-is-not-enough.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"EN","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2HZnWsf8N15kX4QrP603Mh","type":"Asset","createdAt":"2020-09-29T18:20:36.745Z","updatedAt":"2020-09-29T18:20:36.746Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"CIAM technology","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2HZnWsf8N15kX4QrP603Mh/bd169c65ae3684f45fbdd4c04072c342/resource_thumb_5.jpg","details":{"size":43394,"image":{"width":581,"height":388}},"fileName":"resource_thumb_5.jpg","contentType":"image/jpeg"}}}},{"type":"webinars","updatedAt":"2023-05-09T14:44:46.995Z","title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","id":"es-ist-doch-nur-eine-login-box-kaufen-oder-selbst-machen","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5RD54TmyQPpqpa0aJIW1g4","type":"Asset","createdAt":"2023-04-20T14:37:55.977Z","updatedAt":"2023-04-20T14:38:25.795Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5RD54TmyQPpqpa0aJIW1g4/9a61f66cfcfa78f37297f261082cade8/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":145192,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"In der heutigen digitalen Welt, in der Benutzerauthentifizierung von entscheidender Bedeutung für den Schutz von Benutzerdaten und den Erfolg von Anwendungen ist, stehen Unternehmen oft vor der Frage: Sollten sie ihre eigene Authentifizierungslösung entwickeln oder eine vorhandene Lösung kaufen?\n\nIn diesem Webinar von Auth0 werden die Vor- und Nachteile von \"Build vs. Buy\" für die Authentifizierung von Benutzern in Web- und mobilen Anwendungen erörtert. Wir werden verschiedene Aspekte untersuchen, darunter:\n\n- Kosten und Ressourcen: Was sind die finanziellen und personellen Anforderungen für den Aufbau einer eigenen Authentifizierungslösung im Vergleich zum Kauf einer vorhandenen Lösung?\n- Sicherheit: Welche Sicherheitsrisiken und -herausforderungen sind mit dem Eigenbau einer Authentifizierungslösung verbunden und wie können sie gemindert werden? Welche Sicherheitsfunktionen bieten etablierte Authentifizierungslösungen?\n- Skalierbarkeit und Flexibilität: Wie einfach ist es, eine Authentifizierungslösung anzupassen und zu erweitern, um den wachsenden Anforderungen von Benutzern und Anwendungen gerecht zu werden?\n- Zeitlicher Aufwand: Wie viel Zeit und Aufwand ist erforderlich, um eine eigene Authentifizierungslösung zu entwickeln und bereitzustellen, im Vergleich zur Implementierung einer vorhandenen Lösung?\n\n![Tobias Urban | Sr. Manager, Specialist Solutions Engineers](//images.ctfassets.net/2ntc334xpx65/UwOtnVOhDlSLbIB8yQbdt/da8d8a617c0d50469a9120bfbc55654b/Tobias-Urban.jpg)\n\nTobias Urban | Sr. Manager, Specialist Solutions Engineers","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"JbcXkEzUsD3ZCSfdxmQHf","type":"Asset","createdAt":"2023-04-20T14:35:35.003Z","updatedAt":"2023-04-20T14:35:35.003Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/JbcXkEzUsD3ZCSfdxmQHf/f0a9ce0e2c0068f41c78aadf88aef4b3/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":913893,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"40JbGzjdFPWkoc1UR0981j","type":"Asset","createdAt":"2023-04-19T14:09:36.471Z","updatedAt":"2023-04-19T14:09:36.471Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Es ist doch nur eine Login-Box: Kaufen oder selbst machen?","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/40JbGzjdFPWkoc1UR0981j/041ae6160dd5f613035ebe7a0eb6263b/Es_ist_doch_nur_eine_Login-Box_Kaufen_oder_selbst_machen","details":{"size":37199961},"fileName":"Es ist doch nur eine Login-Box Kaufen oder selbst machen?.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000000zJSoAAM-aPA4z000000TN3uGAG"},{"type":"webinars","updatedAt":"2023-05-08T14:02:39.323Z","title":"Sicherheit oder Nutzerfreundlichkeit?","id":"sicherheit-oder-nutzerfreundlichkeit","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1HpH6l1EN8OGYQddsWKQ5k","type":"Asset","createdAt":"2023-04-26T17:33:11.446Z","updatedAt":"2023-04-26T17:33:11.446Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Sicherheit oder Nutzerfreundlichkeit?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1HpH6l1EN8OGYQddsWKQ5k/9c69190b0ee8ac92bd20ad70a0ab4271/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":141187,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Die Sicherheit von Benutzerdaten ist von größter Bedeutung, insbesondere in Zeiten, in denen Datenschutzverletzungen und Identitätsdiebstahl immer häufiger vorkommen. Gleichzeitig erwarten Benutzer jedoch auch eine nahtlose und bequeme Benutzererfahrung. Unternehmen stehen daher oft vor der Herausforderung, das richtige Gleichgewicht zwischen Sicherheit und Benutzererlebnis bei der Authentifizierung zu finden.\n\nIn diesem Webinar von Auth0 werden wir uns mit der Debatte \"Sicherheit vs. Benutzererlebnis\" bei der Authentifizierung von Benutzern auseinandersetzen. Wir werden verschiedene Aspekte beleuchten, darunter:\n- Authentifizierungsfaktoren: Wie beeinflussen verschiedene Authentifizierungsfaktoren wie Passwörter, Mehrfaktor-Authentifizierung (MFA), Biometrie und andere Sicherheitsmechanismen das Benutzererlebnis und die Sicherheit? Wie können Unternehmen das richtige Maß an Sicherheit und Benutzerfreundlichkeit finden?\n- Benutzerverhalten: Wie können Unternehmen Benutzerverhalten und -gewohnheiten analysieren, um sicherheitsrelevante Entscheidungen zu treffen und gleichzeitig ein reibungsloses Benutzererlebnis zu gewährleisten?\n- Technologien und Best Practices: Was sind bewährte Methoden und Technologien, um die Sicherheit zu verbessern, ohne die Benutzererfahrung zu beeinträchtigen? Wie können Unternehmen moderne Authentifizierungslösungen nutzen, um das bestmögliche Gleichgewicht zwischen Sicherheit und Benutzerfreundlichkeit zu finden?\n\n![Tobias Urban | Sr. Manager, Specialist Solutions Engineers](//images.ctfassets.net/2ntc334xpx65/UwOtnVOhDlSLbIB8yQbdt/da8d8a617c0d50469a9120bfbc55654b/Tobias-Urban.jpg)\n\nTobias Urban | Sr. Manager, Specialist Solutions Engineers","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"37dAuPBkZChI8P5yCCYOwD","type":"Asset","createdAt":"2023-04-26T17:32:41.984Z","updatedAt":"2023-04-26T17:32:41.984Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Sicherheit oder Nutzerfreundlichkeit?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/37dAuPBkZChI8P5yCCYOwD/39ff94644415fe5eb42c3d89fb711c52/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":666783,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6orukAXD5oY9MAdmUawU5g","type":"Asset","createdAt":"2023-04-26T17:27:27.581Z","updatedAt":"2023-04-26T17:27:27.581Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Sicherheit oder Nutzerfreundlichkeit?","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6orukAXD5oY9MAdmUawU5g/ec70e1b0a76ab81bb7fbe6b4b47f3573/Sicherheit-oder-Nutzerfreundlichkeit.mp4","details":{"size":36571940},"fileName":"Sicherheit-oder-Nutzerfreundlichkeit.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"bZYvsTp6SfjNWQhPGfVS6","type":"Entry","createdAt":"2022-08-21T01:20:41.889Z","updatedAt":"2022-08-21T01:20:41.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000000zJb8AAE-aPA4z000000TN3zGAG"},{"type":"webinars","updatedAt":"2022-09-10T18:01:16.817Z","title":" はじめてのAuth0 無料トライアル チュートリアル動画","id":"signup-video-japan","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2fj1wWJem6nJnOtQqhvwYD","type":"Asset","createdAt":"2022-08-19T03:49:54.138Z","updatedAt":"2022-08-19T03:49:54.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":" はじめてのAuth0 無料トライアル チュートリアル動画","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2fj1wWJem6nJnOtQqhvwYD/e7470f136c87f2609b5e4c185dbbc929/JP-Cover-Edit__14_.png","details":{"size":293641,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (14).png","contentType":"image/png"}}},"description":"本動画は、Auth0の無料トライアルのチュートリアル動画です。Auth0の無料トライアルを通じて、初めてAuth0を体験される方向けに作成しています。動画の長さは8分51秒で、ステップバイステップのハンズオン形式で下記の内容をご提供しています。\n\n- Auth0の無料トライアルの登録\n- テナントの作成\n- アプリケーションの登録と認証機能\n- ソーシャルログイン〜Googleアカウントでログイン\n- 簡単なログイン画面の修正とFacebookでのログインの追加","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ajjDJ6lTkHvGAUycUI1Ko","type":"Asset","createdAt":"2022-08-19T03:50:09.796Z","updatedAt":"2022-08-19T03:50:09.796Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":" はじめてのAuth0 無料トライアル チュートリアル動画","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ajjDJ6lTkHvGAUycUI1Ko/088b38d0b7d18e0a32c37e32e786152f/JP-Share-Asset-Edit__14_.png","details":{"size":201182,"image":{"width":1200,"height":600}},"fileName":"JP-Share-Asset-Edit (14).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2qXfyiell4EeOlXTqigum7","type":"Asset","createdAt":"2022-08-19T03:52:39.405Z","updatedAt":"2022-08-19T03:52:39.405Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":" はじめてのAuth0 無料トライアル チュートリアル動画","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/2qXfyiell4EeOlXTqigum7/7bbbfc510f8c56d1663f3369f479978d/Quickstart.mp4","details":{"size":264671753},"fileName":"Quickstart.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"JP","ocid":"7014z000001cb4IAAQ-aPA4z000000012zGAA"},{"type":"webinars","updatedAt":"2022-09-10T18:01:05.436Z","title":"中部電力の新規事業創出を支えるID基盤","id":"chuden-webinar-ondemand-jp","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"789k1tE7xZMzc2YsIAviND","type":"Asset","createdAt":"2022-08-19T03:37:53.613Z","updatedAt":"2022-08-19T03:37:53.613Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"中部電力の新規事業創出を支えるID基盤","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/789k1tE7xZMzc2YsIAviND/59d325f269084cb8dffc2eef07bd9bd5/JP-Cover-Edit__13_.png","details":{"size":302750,"image":{"width":600,"height":856}},"fileName":"JP-Cover-Edit (13).png","contentType":"image/png"}}},"description":"中部電力では2019年4月に事業創造本部を設置し、先端技術を活用した新規事業を迅速に開発し、新規サービスを早期に提供する体制を整えることで成長戦略に取り組んできています。本動画では、2020年6月25日に開催したAuth0事例紹介ウェビナーの録画をご視聴いただけます。スピーカーは、中部電力 事業創造本部 清田 雄平 氏 と森川 将聖 氏です。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"16xs1EJTALqgMqiAnAy8Jl","type":"Asset","createdAt":"2022-08-19T03:38:16.536Z","updatedAt":"2022-08-19T03:38:16.536Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"中部電力の新規事業創出を支えるID基盤","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/16xs1EJTALqgMqiAnAy8Jl/8dfe68b84062a3eaeefac0ab08c1b4e2/JP-Share-Asset-Edit__13_.png","details":{"size":198704,"image":{"width":1200,"height":600}},"fileName":"JP-Share-Asset-Edit (13).png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3sW21bkGmoQEw4aJSRITf3","type":"Asset","createdAt":"2022-08-19T03:43:36.226Z","updatedAt":"2022-08-19T03:43:36.226Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"中部電力の新規事業創出を支えるID基盤","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3sW21bkGmoQEw4aJSRITf3/ed14d519e169d0f92cb83625bb291268/Auth0_Chuden_Japan_Webinar.mp4","details":{"size":309329682},"fileName":"Auth0 Chuden Japan Webinar.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"JP","ocid":"7014z000001cb3CAAQ-aPA4z000000012CGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:08:57.725Z","title":"Kundenerlebnis mit CIAM: reibungslos und sicher","id":"kundenerlebnis-mit-ciam-reibungslos-und-sicher","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ZIfg8rScURo2YTnfSKZAU","type":"Asset","createdAt":"2022-07-19T20:08:00.387Z","updatedAt":"2022-07-19T20:08:32.816Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"-Landing Page- Gated Content (any) (625x892px)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ZIfg8rScURo2YTnfSKZAU/862a0ce55e10fb44963331d75c73614f/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":89303,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Viele Unternehmen müssen im Kundenkontakt den Spagat schaffen zwischen Sicherheit, Datenschutz und Komfort – und dabei möglichst keine Kompromisse eingehen. Es wird gezeigt, wie ein Customer-Identity- und -Access-Management (CIAM) im Idealfall aussehen sollte, um eine bessere User Experience zu bieten – mit höchsten Sicherheitsansprüchen.\n\nWenn Kunden mit Unternehmen interagieren, erwarten Sie heutzutage ein tadelloses Erlebnis. Für die Firmen und Behörden wird jedoch die Verwaltung der Kundenidentitäten immer komplexer: Passwort-Dumps, mehrere Geräte pro User und eine unzureichende Akzeptanz von Multi-Faktor-Authentifizierung setzen die Entwicklungs- und Sicherheitsteams immer mehr unter Druck.\n\nGefordert ist ein Gleichgewicht zwischen Datenschutz, Sicherheit und einem Benutzererlebnis, das die Ansprüche der Kunden erfüllt. Aber welches sind die besten Praktiken, um die Daten der Kunden zu schützen, ohne ihr Erlebnis zu beeinträchtigen?\n\nRegistrieren Sie sich jetzt und erfahren Sie von Ruben Rodriguez Perez und Martin Frederichs von Auth0 mehr über die aktuellen Bedrohungen für Ihre Kunden und die Auswirkungen, die diese Bedrohungen auf Ihr Unternehmen haben können. Lernen Sie mehr darüber:\n\n- Wie man die Risiken und Auswirkungen einer Kompromittierung eines Kundenkontos modelliert\n- Mehr Neukunden durch einfacheren Registrierungsprozess\n- Auswahl einer Mehr-Faktor-Authentifizierung, die von den Benutzern bevorzugt wird\n- Techniken zur Überwachung neuer Kontobedrohungen\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7rqXKqdVCIeknzWRg6x33x","type":"Asset","createdAt":"2022-07-19T20:05:46.147Z","updatedAt":"2022-07-19T20:05:46.147Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"-Share Asset- Webinar (Horizontal)","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7rqXKqdVCIeknzWRg6x33x/fda4fe4615804790a6f9bccad6c161ab/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":748951,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ImjY5UsSsgCTpsm4Qxf59","type":"Asset","createdAt":"2022-07-19T19:42:28.826Z","updatedAt":"2022-07-19T19:42:28.826Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Kundenerlebnis mit CIAM - reibungslos und sicher","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4ImjY5UsSsgCTpsm4Qxf59/79fa01a863516c8d58ea9313e0b0e0fa/Kundenerlebnis_mit_CIAM_-_reibungslos_und_sicher.mp4","details":{"size":51702075},"fileName":"Kundenerlebnis mit CIAM - reibungslos und sicher.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4pBaTsjzEicIT97aoA7AyF","type":"Entry","createdAt":"2022-05-26T20:10:28.837Z","updatedAt":"2022-05-26T20:10:28.837Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbBdAAI-aPA4z000000017iGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:08:54.458Z","title":"eID: Maximales Vertrauen in einer digitalen Welt","id":"eid-maximales-vertrauen-in-einer-digitalen-welt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3myEnUHSSkbnnaREK3cGZu","type":"Asset","createdAt":"2022-05-12T22:33:39.734Z","updatedAt":"2022-05-13T15:45:05.931Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"eID: Maximales Vertrauen in einer digitalen Welt","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3myEnUHSSkbnnaREK3cGZu/9b4ec219fd583a7930229643f9fa01a3/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":88425,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Authentifizierung wird immer komplizierter. Die einfache Anmeldung mit Benutzernamen und Passwort reicht meistens nicht mehr aus, um regulatorischen Anforderungen und neuen Geschäftsmodellen gerecht zu werden. Auch wenn es viele Alternativen am Markt gibt, bringt jede Lösung ihre eigenen Vor- und Nachteile mit sich, von der Kundenerfahrung bis hin zur Sicherheit. Insbesondere im Bereich der rechtssicheren Anmeldung wird hier oft noch auf langwierige und teure Prozesse gesetzt.\n\nDass es auch besser geht, zeigen Signicat und Okta in dieser virtuellen Podiums-Diskussion. Die Möglichkeit, Kunden rechtssicher und einfach zu verifizieren, existiert bereits. Viele Unternehmen wissen aber nicht, wie sie diese richtig einsetzen können. Egal ob sie Verträge abschließen, Altersverifizierungen durchführen oder Dienstleister verifizieren möchten: Die Zuversicht, dass eine Person wirklich ist, wer sie vorgibt zu sein, kann so einfach sein wie eine Anmeldung per Google oder Facebook.\n\nIn diesem Gespräch werden folgende Themen adressiert:\n- Was sind eIDs? Warum brauche ich das, wenn es schon Passwörter und soziale Netzwerke gibt?\n- Für welche Geschäftsmodelle sind eIDs überhaupt relevant?\n- Was wünschen sich denn die Kunden? Wann \"lohnt\" sich diese neue Verifizierung?\n- Wie kann ich eIDs in meine Okta / Auth0 Plattform integrieren?\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1kHjbfPMXDgpckZbyRWSAm","type":"Asset","createdAt":"2022-05-12T22:34:00.622Z","updatedAt":"2022-05-12T22:34:00.622Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"eID: Maximales Vertrauen in einer digitalen Welt","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1kHjbfPMXDgpckZbyRWSAm/22d006f89c244288b404a144ccdf54c2/-Share_Asset-_Webinar__Horizontal_.jpeg","details":{"size":746947,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"PoqYYX1EZ4znbKcoz9aIB","type":"Asset","createdAt":"2022-05-12T21:57:17.658Z","updatedAt":"2022-05-12T21:57:17.658Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"eID: Maximales Vertrauen in einer digitalen Welt","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/PoqYYX1EZ4znbKcoz9aIB/90b7b4dd00f75404d3aa231362e6a811/eID__Maximales_Vertrauen_in_einer_digitalen_Welt.mp4","details":{"size":256224991},"fileName":"eID_ Maximales Vertrauen in einer digitalen Welt.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbbSAAQ-aPA4z0000008OZdGAM"},{"type":"webinars","updatedAt":"2022-09-09T03:08:54.119Z","title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","id":"hybride-moderne-authentifizierung-das-neue-normal-im-retail","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7JOzEFfdt8xQP275EyOTSI","type":"Asset","createdAt":"2022-05-02T15:38:29.946Z","updatedAt":"2022-05-02T16:24:14.753Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7JOzEFfdt8xQP275EyOTSI/822e9d65d915cb488c78d9d29643803c/hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg","details":{"size":92241,"image":{"width":600,"height":856}},"fileName":"hybride-moderne-authentifizierung-das-neue-normal-im-retail-thumbnail.jpeg","contentType":"image/jpeg"}}},"description":"Die Ereignisse der letzten zwei Jahre haben die Umstellung auf digitale Dienstleistungen aus der Not heraus beschleunigt. Der E-Commerce wurde zum größten Wachstumsbereich, und die traditionellen stationären Geschäfte entwickelten rasch mehr digitale Angebote. Die Art und Weise, wie wir einkaufen, hat sich unwiderruflich verändert - von Waren des täglichen Bedarfs über Luxusartikel bis hin zu Apps für die Lieferung von Lebensmitteln. Mit diesem Wandel und den globalen Lieferkettenproblemen kam es zu einem enormen Anstieg der Betrugsfälle.\n\nDer Aufbau von digitalem Vertrauen bei gleichzeitiger Bereitstellung eines reibungslosen Einkaufserlebnisses wurde zu einem entscheidenden Faktor für die Sicherheit der Kunden und den Schutz eines neuen digitalen Ansatzes vor immer aggressiveren Phishing-, Identitätsdiebstahl- und Ransomware-Angriffen auf Unternehmen und Verbraucher, die online einkaufen.\n\nRegistrieren Sie sich für unser Webinar und erfahren Sie, wie Sie Ihren Kunden ein schnelles und sicheres Erlebnis bieten und gleichzeitig Ihr Unternehmen vor diesen bösartigen Aktivitäten schützen können. Lernen Sie mehr darüber:\n\n- Wie Sie Ihr Unternehmen dazu bringen, die Verifizierungspflichten zu erfüllen, z. B. beim Check-in\n- Ihr Hauptaugenmerk, wenn Sie versuchen, Ihre Kunden wieder in physische Einzelhandelsgeschäfte zu bringen (z. B. Verifizierungsprozess)\n- Verschiedene moderne Ansätze für das Identitätsmanagement und warum dies für Ihr Mehrwertangebot so wichtig ist\n- Verknüpfung der Online- und Offline-Identität Ihrer Kunden, um überall ein sicheres Einkaufserlebnis zu schaffen","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2iD1IFmuCAySeLPwNE8Evf","type":"Asset","createdAt":"2022-05-02T15:38:57.340Z","updatedAt":"2022-05-02T15:38:57.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2iD1IFmuCAySeLPwNE8Evf/25b9dd6697e2e1be2e3df3d3b8f09c9f/hybride-moderne-authentifizierung-das-neue-normal-im-retail-share-asset.jpeg","details":{"size":775026,"image":{"width":5000,"height":2432}},"fileName":"hybride-moderne-authentifizierung-das-neue-normal-im-retail-share-asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3h1GNesvUK9pLD9LWU3MjY","type":"Asset","createdAt":"2022-04-29T22:26:49.823Z","updatedAt":"2022-04-29T22:26:49.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Hybride Moderne Authentifizierung: das neue Normal im Retail","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3h1GNesvUK9pLD9LWU3MjY/596890ae525ca6ffe54b4db93f22b06f/Hybride_Moderne_Authentifizierung_-_das_neue_Normal_im_Retail.mp4","details":{"size":49653945},"fileName":"Hybride Moderne Authentifizierung - das neue Normal im Retail.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbbRAAQ-aPA4z0000008OZZGA2"},{"type":"webinars","updatedAt":"2022-09-09T03:08:48.640Z","title":"Komplexe Identitäten - Der einfache Weg!","id":"complex-identity-de","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6VoE9JxeajbSOuVpIHWIig","type":"Asset","createdAt":"2022-03-16T19:29:40.837Z","updatedAt":"2022-03-16T19:46:04.375Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Komplexe Identitäten - Der einfache Weg!","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6VoE9JxeajbSOuVpIHWIig/264d6e61a6bc3b0580b908329756430a/-Landing_Page-_Gated_Content__any___625x892px_.jpeg","details":{"size":96073,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content (any) (625x892px).jpeg","contentType":"image/jpeg"}}},"description":"Viele der größten Softwareunternehmen haben heutzutage Probleme damit, ihren Benutzern ein skalierbares, zuverlässiges Identitätsmanagement zu bieten. Die meisten Ausfälle großer Technologieunternehmen waren auf Fehler im Identitätsmanagementsystem zurückzuführen, und Cyberangriffe konzentrieren sich zunehmend auf die Login-Box. Wie kann ein Unternehmen ohne Tausende von Entwicklern dies bewältigen?\n\nIdentitätsmanagement kann schwierig sein, muss es aber nicht. In diesem Webinar wird Tobias Urban, CIAM-Spezialist bei Okta, über häufige Herausforderungen, Fallstricke und Best Practices bei der Implementierung von Kundenidentitätssystemen sprechen. Lernen Sie, wie einfach dies mit verwalteten Identitätssystemen zu bewerkstelligen ist und welche Potenziale dieser Ansatz freisetzen kann.\n\nIn diesem Webinar werden Sie erfahren:\n- Warum selbst die größten Unternehmen mit dem Identitätsmanagement für Endbenutzer zu kämpfen haben\n- Warum es so schwierig ist, Customer Identity Management (CIAM) richtig zu machen\n- Wie Managed Services Ihr CIAM aufwerten können, ohne die Flexibilität einzuschränken\n- Häufige Fallstricke und bewährte Praktiken bei der Festlegung einer CIAM-Strategie","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"19Q4V653n2nDMA1xyzyN1C","type":"Asset","createdAt":"2022-03-16T19:45:14.120Z","updatedAt":"2022-03-16T19:45:14.120Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Komplexe Identitäten - Der einfache Weg!","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/19Q4V653n2nDMA1xyzyN1C/91410fa5d712b7926cc9b7908a14d831/-Share_Asset-_Upcoming_Webinar__Horizontal_.jpeg","details":{"size":841082,"image":{"width":5000,"height":2432}},"fileName":"-Share Asset- Upcoming Webinar (Horizontal).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7KamW7T6sm2oSn4MoQGZiX","type":"Asset","createdAt":"2022-03-16T19:17:22.486Z","updatedAt":"2022-03-16T19:17:22.486Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Komplexe Identitäten - Der einfache Weg!","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7KamW7T6sm2oSn4MoQGZiX/75efb25e11367285aa7e5b6088085b61/Komplexe_Identita__ten_-_Der_einfache_Weg_.mp4","details":{"size":112306835},"fileName":"Komplexe Identitäten - Der einfache Weg!.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3CQgDQfZlca8AbIknQzayr","type":"Entry","createdAt":"2021-03-29T13:12:40.634Z","updatedAt":"2021-05-10T21:18:03.946Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbbQAAQ-aPA4z0000008OZUGA2"},{"type":"webinars","updatedAt":"2022-09-09T03:08:42.574Z","title":"Technical Masterclass 2021: Hürden und Helfer in der Benutzermigration","id":"technical-masterclass-2021-12-dach","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4VuiXT7J80b5XsRg1MDZ1f","type":"Asset","createdAt":"2021-12-10T05:03:44.477Z","updatedAt":"2021-12-10T05:03:44.477Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"[Landing Page] Gated Content - Technical Masterclass 2021","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4VuiXT7J80b5XsRg1MDZ1f/d875ac07ffe4f5494e367adfba34eab9/-Landing_Page-_Gated_Content_-_Technical_Masterclass_2021__625x892px_.png","details":{"size":314513,"image":{"width":600,"height":856}},"fileName":"-Landing Page- Gated Content - Technical Masterclass 2021 (625x892px).png","contentType":"image/png"}}},"description":"Bei der Modernisierung oder Ablösung bestehender Identitätssysteme wird ein Punkt oft erst dann bedacht, wenn es bereits zu spät ist: die Migration der Benutzerdaten. \n\nWas eigentlich nur ein Austausch der Datenbank sein sollte, führt oft zu schlaflosen Nächten, Anwendungsausfällen und im schlimmsten Fall zum Abbruch des Projekts.\n\nDass es auch anders geht, zeigen Ihnen Ruben Rodriguez Perez und Tobias Urban von Auth0 bei unserer Technical Masterclass. Aus zahlreichen Projekten und Implementierungen berichten sie, welche Fehler bei der Planung von Migrationen häufig auftreten, welche Ansätze es für eine Migration gibt und wie Sie in Ihrem Projekt an den richtigen Schrauben drehen können, um Ihre Migration zum Erfolg zu führen.\n\nErfahren Sie mehr über:\n- Typische Herausforderungen bei der Migration von Benutzerdaten und wie sie zu lösen sind.\n- Effiziente Ansätze und nützliche Tools für eine effektive Benutzermigration.\n- Strategien für eine erfolgreiche Migration von trägen Daten aus eingeschränkten Quellsystemen.\n- Empfehlungen für ein effizientes Management des Projekts.\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"78ddsb3sOKW43YPSfTUv4p","type":"Asset","createdAt":"2021-12-10T10:27:14.106Z","updatedAt":"2021-12-10T10:27:14.106Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Technical Masterclass - Share Asset","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/78ddsb3sOKW43YPSfTUv4p/271633d03e4552385bbed9e61fd5735b/Auth0_Technical_Masterclass_-_Share_Asset.png","details":{"size":464684,"image":{"width":1249,"height":608}},"fileName":"Auth0 Technical Masterclass - Share Asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7dqaw6zJc8MsOXGgH5Ljja","type":"Asset","createdAt":"2021-12-10T05:12:16.306Z","updatedAt":"2021-12-10T05:12:16.306Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 Technical Masterclass 2021 - video","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7dqaw6zJc8MsOXGgH5Ljja/a97e60b1fcd9ae02ab88f3d0180a574e/Auth0_Technical_Masterclass_2021_-_Hu__rden_und_Helfer_in_der_Benutzermigration__Erfahrungen_aus_der_Praxis.mp4","details":{"size":79508939},"fileName":"Auth0 Technical Masterclass 2021 - Hürden und Helfer in der Benutzermigration_ Erfahrungen aus der Praxis.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbBVAAY-aPA4z000000015TGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.923Z","title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","id":"identity-strategy-dach-rec","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3pOpbobbk1VdwOdRsyEkn8","type":"Asset","createdAt":"2021-10-13T15:44:26.425Z","updatedAt":"2021-11-18T08:55:42.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":5,"locale":"en-US"},"fields":{"title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3pOpbobbk1VdwOdRsyEkn8/c1de7ccab1b8af31dda5eed2d424e06d/dach-webinar-2021-11.jpg","details":{"size":55420,"image":{"width":600,"height":856}},"fileName":"dach-webinar-2021-11.jpg","contentType":"image/jpeg"}}},"description":"__Unternehmen, die in den nächsten fünf Jahren erfolgreich sein wollen, müssen einfache Prozesse und Anmeldeerfahrungen schaffen, die keine Kompromisse zwischen Sicherheit, Datenschutz und Komfort eingehen.__\n\nWir möchten zeigen wie dies heute schon möglich ist und zu einer besseren User Experience führt.\n\nTeil erfahren Sie von unserem Senior Solutions Engineer, __Michael Pattison__, mehr darüber:\n\n- Wie man flexibel die Identität nutzt um eine Anwendung zu sichern;\n- Schutz von privaten Daten;\n- Sicherstellung einer nahtlosen Erfahrung für Ihre Kunden.\n\nEntdecken Sie, wie Auth0 Sie und Ihr Unternehmen dabei unterstützen kann, Identitätsparadigmen zu erneuern und eine erfolgreiche Identitätsstrategie aufzubauen.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5VJjy6uc7q9oDKW3fJVuAC","type":"Asset","createdAt":"2021-11-17T17:12:43.876Z","updatedAt":"2021-11-17T17:12:43.876Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5VJjy6uc7q9oDKW3fJVuAC/a370f2f0c99bcdd561d9e2a755e2fb63/Identity-Strategy_Was-brauchen-sie-um-erfolgreich-zu-sein-share-asset.png","details":{"size":443123,"image":{"width":1250,"height":608}},"fileName":"Identity-Strategy_Was-brauchen-sie-um-erfolgreich-zu-sein-share-asset.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"RwwiW7KArbrAubze8VPJF","type":"Asset","createdAt":"2021-11-17T16:51:42.608Z","updatedAt":"2021-11-17T16:51:42.608Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identity Strategy: Was brauchen Sie um erfolgreich zu sein?","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/RwwiW7KArbrAubze8VPJF/269b52eb68c9fca1eba9ddeeb19740b4/Identity-Strategy_Was-brauchen-sie-um-erfolgreich-zu-sein.mp4","details":{"size":57143959},"fileName":"Identity-Strategy_Was-brauchen-sie-um-erfolgreich-zu-sein.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"DE","ocid":"7014z000001cbBUAAY-aPA4z0000000157GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.637Z","title":"El estado de identidad segura de Auth0","id":"state-of-secure-identity-webinar-es","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5oLGLGkR8tFVNIVAr8NlCD","type":"Asset","createdAt":"2021-10-28T23:06:47.093Z","updatedAt":"2021-10-30T00:23:20.254Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"locale":"en-US"},"fields":{"title":"El estado de identidad segura de Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5oLGLGkR8tFVNIVAr8NlCD/995d0e91f74e7dc33071a1d283277da5/updated-state-of-secure-identity-es.jpeg","details":{"size":63344,"image":{"width":600,"height":856}},"fileName":"updated-state-of-secure-identity-es.jpeg","contentType":"image/jpeg"}}},"description":"Las identidades digitales controlan el acceso a un número cada vez mayor de aplicaciones, servicios y sistemas críticos. Esto hace que la identidad sea un vector de ataque interesante para los actores de amenazas y destaca la importancia de la autenticación y la autorización para preservar la confianza y la seguridad.\n\nEl Informe de estado de identidad segura de Auth0 destaca las últimas tendencias en seguridad de identidad, incluidos los tipos de ataques que ha observado Auth0, las características de estos ataques, las industrias más afectadas y las tasas de adopción de tecnologías de protección de identidad.\n\nDurante este webinar, brindaremos más información sobre qué industrias:\n- Los más objetivo de los ataques de relleno de credenciales\n- Los más atacados por los ataques de inyección SQL\n- Liderando el camino en la adopción de MFA para mejorar la postura de seguridad general\n\nTambién arrojaremos luz sobre la creación de cuentas falsas, los ataques de omisión de MFA y las medidas defensivas que se están adoptando para combatir estas amenazas a la seguridad de la identidad.\n\n### Apresentador: Cassio Sampaio, Vicepresidente Senior de Producto, Auth0\nComo vicepresidente senior de producto, Cassio Sampaio es responsable del diseño y desarrollo de productos globales de Auth0. Tiene más de 20 años de experiencia en el desarrollo, el diseño y la estrategia de lanzamiento de carteras de productos de tecnología, y ha lanzado más de 20 productos B2B y B2B2C a nivel mundial.\n\nSampaio tiene una sólida formación técnica en desarrollo de pila completa, ingeniería de redes, administración de bases de datos y operaciones de centros de datos / NOC dentro de la seguridad, la identidad y la privacidad.\n\nMás recientemente, Sampaio se desempeñó como Director de Producto, Operaciones de Negocios de Infraestructura de Nube en Apple, ejecutando productos y operaciones de nube interna. Anteriormente ocupó puestos de productos de nivel ejecutivo en Apple, DigitalOcean, Sandvine y Guavus, donde adquirió experiencia en marketing, diseño, gestión de productos y desarrollo corporativo. Originario de Brasil, ha vivido en Toronto, Praga y Rotterdam y ha trabajado directamente con clientes en más de 40 países. Sampaio tiene un MBA de la Brazilian Business School y tiene su sede en el Área de la Bahía de San Francisco. En su tiempo libre, disfruta pasar tiempo con su familia, viajar, leer y cocinar.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7kZ48vqeWPCohG6JXpnOgB","type":"Asset","createdAt":"2021-10-28T23:06:11.496Z","updatedAt":"2021-11-03T22:40:24.533Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":3,"locale":"en-US"},"fields":{"title":"El estado de identidad segura de Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7kZ48vqeWPCohG6JXpnOgB/94ba968a13f9137dcb703ec629097502/updated-state-of-secure-identity-es-share-asset.jpeg","details":{"size":286114,"image":{"width":2400,"height":1260}},"fileName":"updated-state-of-secure-identity-es-share-asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ktHEpi9MDzqLfeROViyYO","type":"Asset","createdAt":"2021-11-17T23:30:39.225Z","updatedAt":"2021-11-17T23:53:15.431Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"El estado de identidad segura de Auth0","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/4ktHEpi9MDzqLfeROViyYO/9aa9865d11f899a1b2add8f253d1d443/GMT20211115-003057_Recording_1920x1080.mp4","details":{"size":31842899},"fileName":"GMT20211115-003057_Recording_1920x1080.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"ES","ocid":"7014z000001cb69AAA-aPA4z000000013tGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:08:41.044Z","title":"O estado da identidade segura da Auth0","id":"state-of-secure-identity-webinar-pt","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7uGFs6V1NWI3BWfy2Y2tIV","type":"Asset","createdAt":"2021-11-15T19:59:31.294Z","updatedAt":"2021-11-15T19:59:31.294Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"O estado da identidade segura da Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7uGFs6V1NWI3BWfy2Y2tIV/32aaa2df1b6c840141969914f8cc2920/pt-state-of-secure-identity-webinar-thumbnail.jpeg","details":{"size":58083,"image":{"width":600,"height":856}},"fileName":"pt-state-of-secure-identity-webinar-thumbnail.jpeg","contentType":"image/jpeg"}}},"description":"As identidades digitais controlam o acesso a um número crescente de aplicativos, serviços e sistemas críticos. Isso torna a identidade um vetor de ataque interessante para os agentes de ameaças e destaca a importância da autenticação e da autorização para preservar a confiança e a segurança.\n\nO relatório do estado da identidade segura da Auth0 destaca as tendências mais recentes em segurança de identidade, incluindo os tipos de ataques que a Auth0 observou, as características desses ataques, os setores mais afetados e as taxas de adoção de tecnologias de proteção de identidade.\n\nDurante este webinar, forneceremos mais informações sobre quais setores:\n- Foram mais visados para ataques de credenciamento\n- Aqueles mais afetados por ataques de injeção de SQL\n- Lideraram na adoção do MFA para melhorar a postura geral de segurança\n\nTambém lançaremos luz sobre a criação de contas falsas, ataques de desvio de MFA e medidas defensivas que estão sendo tomadas para combater essas ameaças à segurança de identidade.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1XwZ5vvGDHkrpx3ROxs3Mk","type":"Asset","createdAt":"2021-11-15T20:00:59.090Z","updatedAt":"2021-11-15T20:00:59.090Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Relatório de status de identidade segura do Auth0","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1XwZ5vvGDHkrpx3ROxs3Mk/651cb82f4a5831952f150ebb3c7b3833/pt-state-of-secure-identity-share-asset.jpeg","details":{"size":90894,"image":{"width":1600,"height":778}},"fileName":"pt-state-of-secure-identity-share-asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1yVOy2kJdFqgwLkP4PbO0p","type":"Asset","createdAt":"2021-11-15T20:03:27.184Z","updatedAt":"2021-11-15T20:03:27.184Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"O estado da identidade segura","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1yVOy2kJdFqgwLkP4PbO0p/91791c8ebf73de2b5b5c25f93f129d6a/GMT20211108-222116_Recording_1920x1080.mp4","details":{"size":36719677},"fileName":"GMT20211108-222116_Recording_1920x1080.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"PT","ocid":"7014z000001cb68AAA-aPA4z000000013sGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:08:39.196Z","title":"Identitätsmanagement als Lupe in Ihre Anwendung","id":"identitasmanagement-oparco-partner-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4XhKDaCEioEe82q9lPRFkq","type":"Asset","createdAt":"2021-10-19T16:43:11.580Z","updatedAt":"2021-10-19T16:43:11.580Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement als Lupe in Ihre Anwendung","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4XhKDaCEioEe82q9lPRFkq/c009350f0f27a18f73d9cd9c1a1458ea/identity-management-de.jpeg","details":{"size":68599,"image":{"width":600,"height":856}},"fileName":"identity-management-de.jpeg","contentType":"image/jpeg"}}},"description":"Die Entwicklung und dem Management moderner Lösungen innerhalb verschiedener Abteilungen im Unternehmen wird zunehmend komplexer. Dadurch wird es notwendig, umfangreiche KPIs zu erheben und die Nutzung der eigenen Lösung von Kunden und anderen Systemen detailliert zu verfolgen. \n\nEin zentraler Service in dieser Nutzung bildet das Identitätsmanagement, das Nutzer und Systeme verwaltet und komplexe Zugriffe steuert. Oftmals werden hier jedoch aus Sicherheitsgründen Möglichkeiten ausgelassen, um die Nutzererfahrung zu verbessern und relevante Trends frühzeitig zu erkennen. \n\nIn diesem Webinar zeigen __Markus Winkler__, Geschäftsführer von Oparco, und __Tobias Urban__, Senior Solutions Engineer bei Auth0, wie Sie die Blackbox Identitätsmanagement öffnen und mit einer sowohl sicheren als auch zugänglichen Lösung neue Mehrwerte für Ihr Unternehmen verwirklichen. __Registrieren Sie sich jetzt__ und erfahren Sie mehr über:\n\n- Welche Daten im Authentifizierungs- und Autorisierungsprozess anfallen\n- Wie Erkenntnisse aus dem CIAM-Tool sicher und datenschutzkonform verwertbar gemacht werden können\n- Welche Mehrwerte durch umfangreiche Nutzerprofile entstehen\n- Warum Identitätsmanagement essentiell ist, um die Performance Ihrer Systeme zu messen","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1PuggKLi0oc4OtAheAbmwO","type":"Asset","createdAt":"2021-10-19T16:44:37.092Z","updatedAt":"2021-10-19T16:44:37.092Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement als Lupe in Ihre Anwendung","description":"","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1PuggKLi0oc4OtAheAbmwO/9f25d539890118f10a0480392e7bb90d/On-Demand_Ansehen.png","details":{"size":1833160,"image":{"width":5000,"height":2432}},"fileName":"On-Demand Ansehen.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6js4RtjQZrWSTme0UVqCww","type":"Asset","createdAt":"2021-10-19T16:49:38.165Z","updatedAt":"2021-10-19T16:49:38.165Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement als Lupe in Ihre Anwendung","description":"","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6js4RtjQZrWSTme0UVqCww/f8ecf7d5cc11bb826453ba19b1ef6d45/Identita__tsmanagement_als_Lupe_in_Ihre_Anwendung.mp4","details":{"size":77515455},"fileName":"Identitätsmanagement als Lupe in Ihre Anwendung.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"DE","ocid":"7014z000001cbBTAAY-aPA4z0000000151GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:08:34.356Z","title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","id":"modernes-ciam","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1mxjhuxeVe47kr5AF9EY5m","type":"Asset","createdAt":"2021-06-02T17:16:25.619Z","updatedAt":"2021-06-16T20:25:25.624Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1mxjhuxeVe47kr5AF9EY5m/4a65fb1ad4a8b8c07ea5e85542c8c5ed/Auth0-Resource_Cover-iC-Consult.png","details":{"size":145663,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-iC-Consult.png","contentType":"image/png"}}},"description":"In diesem Webinar erfahren Sie von unseren Experten, welche Möglichkeiten modernes Identitäts-Management abseits der reinen Login-Box bietet.\nDurch die Einbettung ihres CIAM-Systems in bestehende Geschäftsprozesse, die Entlastung der Produktentwicklung und die daraus gewonnene Zeit für Innovation, kann Ihr CIAM-Tool zur digitalen Transformation und Umsatzsteigerung Ihres Unternehmens beitragen.\n\nWir zeigen Ihnen:\n- die Features moderner CIAM-Lösungen und die Vorzüge von Standardlösungen im Betrieb\n- die Potentiale, die durch die Integration der Identitätsverwaltung in die betrieblichen Prozesse entstehen\n- anhand von Kundenbeispielen, wie eine erfolgreiche Integration und die erzielten Potentiale aussehen\n- die notwendigen Rahmenbedingungen für eine erfolgreiche Gesamtintegration\n\nSprecher:\n- Andre Priebe, CTO, iC Consult Group\n- Tobias Urban, Solutions Engineer, Auth0\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3uoqWgMdmSCfYUisH6Ufg","type":"Asset","createdAt":"2021-06-02T17:17:00.412Z","updatedAt":"2021-06-16T20:25:31.187Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3uoqWgMdmSCfYUisH6Ufg/2df5fd0768889822f922ecb4026dcda7/Auth0-Share-asset-iC-Consult.png","details":{"size":332862,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Share-asset-iC-Consult.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1R8f1WoOHlWVBDC9HrTl8m","type":"Asset","createdAt":"2021-06-02T17:26:34.004Z","updatedAt":"2021-06-02T17:26:34.004Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Modernes CIAM- Plattform und Kernstück Ihrer Kundenbeziehungen (1)","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/1R8f1WoOHlWVBDC9HrTl8m/27521e91439c6e3d648ad5dcfd344d48/Modernes_CIAM-_Plattform_und_Kernstu__ck_Ihrer_Kundenbeziehungen.mp4","details":{"size":499043659},"fileName":"Modernes CIAM- Plattform und Kernstück Ihrer Kundenbeziehungen.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"DE","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1ySJO1i67PNCgUkKkjiBRn","type":"Asset","createdAt":"2021-06-02T17:17:24.122Z","updatedAt":"2021-06-16T20:25:38.911Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"Modernes CIAM: Plattform und Kernstück Ihrer Kundenbeziehungen","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1ySJO1i67PNCgUkKkjiBRn/a984d95a465f2cf97a35f2a8c7adaf6b/Auth0-Share-asset-iC-Consult-Square.png","details":{"size":414758,"image":{"width":2267,"height":2267}},"fileName":"Auth0-Share-asset-iC-Consult-Square.png","contentType":"image/png"}}},"ocid":"7014z000001cbBPAAY-aPA4z000000013WGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:08:34.058Z","title":"La defensa contra ataques automatizados","id":"la-defensa-contra-ataques-automatizados-on-demand","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1MhcmV78sDblA49uqdUKWW","type":"Asset","createdAt":"2021-05-19T17:03:58.778Z","updatedAt":"2021-06-16T20:30:48.493Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"La defensa contra ataques automatizados","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1MhcmV78sDblA49uqdUKWW/bd960b66e6b6da158871d1e48e2ba4ff/Webinar__ES__Latam.jpeg","details":{"size":78300,"image":{"width":600,"height":856}},"fileName":"Webinar (ES) Latam.jpeg","contentType":"image/jpeg"}}},"description":"Los ataques de relleno de credenciales a menudo se basan en el robo de credenciales (nombre de usuario y contraseña) de una brecha de datos anterior, y se utilizan para obtener acceso no autorizado a cuentas de usuario en otro sitio web.\n\nLa mejor defensa contra estos ataques automatizados es utilizar un enfoque de tres capas dentro del flujo de autenticación.\n\n• Detección de bots\n• Detección de contraseñas comprometidas\n• Autenticación multifactor (MFA)\n\nÚnase a Tech Unicorn Auth0, y al ingeniero senior de soluciones, Gabriel Valdez, mientras brindamos una descripción general de estos ataques, por qué son tan peligrosos y cómo Auth0 previene este riesgo de seguridad de aplicaciones más críticas.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5CeIy9rPauDbMDLBtHtif9","type":"Asset","createdAt":"2021-05-19T17:04:52.840Z","updatedAt":"2021-06-16T20:30:54.776Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"en-US"},"fields":{"title":"La defensa contra ataques automatizados","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5CeIy9rPauDbMDLBtHtif9/3068e3699ec5e81530cd18fcaf98057b/Webinar__ES__share_asset.jpeg","details":{"size":653232,"image":{"width":5000,"height":2432}},"fileName":"Webinar (ES) share asset.jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6kt12LUzY3IgebV5edUTYU","type":"Asset","createdAt":"2021-05-19T17:19:29.322Z","updatedAt":"2021-05-19T17:19:29.322Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"La Defensa contra ataques automatizados","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6kt12LUzY3IgebV5edUTYU/09a3683b88931700f0cbc03027c6f6b3/La_Defensa_contra_ataques_automatizados_.mp4","details":{"size":150882757},"fileName":"La Defensa contra ataques automatizados .mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4ZbY22hiXDIWi3dneTqGYl","type":"Entry","createdAt":"2021-01-26T14:43:00.111Z","updatedAt":"2021-05-10T21:18:29.330Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}}}},"language":"ES","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1yzjSSr5IlCiyfgmGJBjQ2","type":"Asset","createdAt":"2021-05-21T17:00:55.458Z","updatedAt":"2021-05-21T17:00:55.458Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"webinar-thumb-blue","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1yzjSSr5IlCiyfgmGJBjQ2/a34d716f1cf88cb024cdae53b2acb356/webinar_thumb_blue.png","details":{"size":61379,"image":{"width":279,"height":186}},"fileName":"webinar_thumb_blue.png","contentType":"image/png"}}},"ocid":"7014z000001cb5WAAQ-aPA4z000000013YGAQ"},{"type":"webinars","updatedAt":"2022-09-09T03:08:33.664Z","title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","id":"identitatsmanagement-webinar-de","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7jr0wXzKoy5En25iMILhqB","type":"Asset","createdAt":"2021-05-19T16:44:04.316Z","updatedAt":"2021-05-20T13:55:28.827Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":2,"locale":"en-US"},"fields":{"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7jr0wXzKoy5En25iMILhqB/b187c6b8a41cf2d78ce0ef939f038fde/Auth0-Resource_Cover-PwC-GC__1_.png","details":{"size":201896,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-PwC-GC (1).png","contentType":"image/png"}}},"description":"Identitätsmanagement ist etwas für die Security-Abteilung? Nicht nur! In diesem Vortrag zeigen Moritz Anders, Director Identity bei PwC, und Tobias Urban, Partner Solutions Engineer bei Auth0, welche Potentiale gutes Identitätsmanagement für Ihr Business und Ihre kundenorientierten Prozesse bieten kann. Anhand von Projektbeispielen und Best Practices wird aufgezeigt, wie Sie durch Ihren Anmelde-Prozess Ihre Marketing- und Governance-Landschaft steuern können und so Mehrwerte für Ihre Kunden und Ihre interne Prozesslandschaft schaffen.\nIn diesem Webinar zeigen wir Ihnen:\n\n- Warum modernes Kunden-Identitätsmanagement mehr als nur eine Datenschutz-Auflage ist\n\n- Wie Sie durch Integrationen und Tools wie zB Salesforce Ihr Front-Office automatisieren können\n\n- Ein integriertes Gesamtsystem anhand einer Demonstration mit Auth0\n\n- Kundenbeispiele von erfolgreichen Integrationsprojekten\n","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"Beu8IA2B7qmj9Q7A1rgH1","type":"Asset","createdAt":"2021-05-19T16:46:56.068Z","updatedAt":"2021-05-19T16:46:56.068Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","file":{"url":"//images.ctfassets.net/2ntc334xpx65/Beu8IA2B7qmj9Q7A1rgH1/0231e1115307d3725a219621f68dd07a/Auth0-Share-asset-PwC-GC.png","details":{"size":215743,"image":{"width":1250,"height":608}},"fileName":"Auth0-Share-asset-PwC-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ySsjYO8Zb5RhzOKZrierO","type":"Asset","createdAt":"2021-05-19T17:06:19.194Z","updatedAt":"2021-05-19T17:06:19.194Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/7ySsjYO8Zb5RhzOKZrierO/48830205d5897098c46637c8783c57fc/Identit__tsmanagement_-_Ihre_Geheimwaffe_f__r_Vertrieb_und_Marketing_.mp4","details":{"size":151865253},"fileName":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"DE","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"649BXxBhj26hFBpUuw9VE4","type":"Asset","createdAt":"2021-05-19T16:57:59.980Z","updatedAt":"2021-05-19T16:57:59.980Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Identitätsmanagement - Ihre Geheimwaffe für Vertrieb und Marketing!","file":{"url":"//images.ctfassets.net/2ntc334xpx65/649BXxBhj26hFBpUuw9VE4/a76b51446150410924bb1fb87e17c6d3/Video_Template_Square.jpeg","details":{"size":996299,"image":{"width":5001,"height":5001}},"fileName":"Video_Template_Square.jpeg","contentType":"image/jpeg"}}},"ocid":"7014z000001cbBQAAY-aPA4z000000013aGAA"},{"type":"webinars","updatedAt":"2022-09-09T03:07:42.679Z","title":"Est-ce que le Cloud est sur le point de subir une crise d’identité?","id":"Securite-dans-le-Cloud","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1bn2LyLsfrQJuTrFh1bU9w","type":"Asset","createdAt":"2021-03-25T14:46:53.548Z","updatedAt":"2021-03-25T14:46:53.548Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0-Securite-dans-le-Cloud-Cover","description":"Auth0-Securite-dans-le-Cloud-Cover","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1bn2LyLsfrQJuTrFh1bU9w/8421c7277372c0a573771a5d80fa0dd5/Auth0-Securite-dans-le-Cloud-Cover.png","details":{"size":409465,"image":{"width":600,"height":856}},"fileName":"Auth0-Securite-dans-le-Cloud-Cover.png","contentType":"image/png"}}},"description":"Une enquête, menée par IDSA auprès de plus de 500 responsables de la sécurité informatique en 2020, révèle que 79 % des organisations ont connu une faille de sécurité liée à l'identité au cours des deux dernières années.\n\nCompte tenu de l'augmentation rapide du travail à distance et de la migration des entreprises vers des applications basées sur le cloud, ce problème ne fera qu'empirer. Pour que les entreprises puissent répondre aux exigences croissantes du Cloud Computing, elles devront s'assurer qu'elles disposent d'une solution IAM (gestion des identités et des accès) robuste et évolutive.\n\nDurant cette séance, quelques thèmes que couvriront nos deux intervenants sont:\n\n- Les points clés de la sécurité dans le cloud \n- Comment utiliser le cloud pour simplifier et améliorer sa posture de sécurité\n- Présentation de deux cas d’usage clients\n- Illustration de l’importance d’une solution CIAM à travers une démonstration produit","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6KfoJF2CQ7qTLmSRlUThzJ","type":"Asset","createdAt":"2021-03-25T14:47:08.829Z","updatedAt":"2024-04-05T12:56:33.602Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0-Securite-dans-le-Cloud-Shared","file":{"url":"//images.ctfassets.net/2ntc334xpx65/6KfoJF2CQ7qTLmSRlUThzJ/11d3a65a3fb5b1447bb395308df975b8/Auth0-Securite-dans-le-Cloud-Shared.png","details":{"size":1484820,"image":{"width":2400,"height":1260}},"fileName":"Auth0-Securite-dans-le-Cloud-Shared.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"6vdummJnlfF4PCLXufGMoy","type":"Asset","createdAt":"2021-03-25T14:47:13.831Z","updatedAt":"2021-03-25T15:03:25.652Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"k1iiqh9b7n","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/6vdummJnlfF4PCLXufGMoy/ca03df761d58946131b7c5b3f5a0de6a/Se__curite___dans_le_Cloud__est-ce_que_le_Cloud_est_sur_le_point_de_subir_une_crise_d___identite___.mov","details":{"size":87174353},"fileName":"Sécurité dans le Cloud_ est-ce que le Cloud est sur le point de subir une crise d’identité_.mov","contentType":"video/quicktime"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5uj0akIPMqNUCI5N3xpI6B","type":"Entry","createdAt":"2019-11-06T13:51:43.802Z","updatedAt":"2021-03-30T08:16:58.815Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0 + AWS","twitter":"https://twitter.com/auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"13jXtxu7svY0l7YEMraNOr","type":"Asset","createdAt":"2021-03-29T19:29:26.090Z","updatedAt":"2021-03-29T19:29:26.090Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0+AWS","file":{"url":"//images.ctfassets.net/2ntc334xpx65/13jXtxu7svY0l7YEMraNOr/eda7f30bf6ef67ce36e192eb4f2a45fb/Auth0_AWS.png","details":{"size":70755,"image":{"width":420,"height":420}},"fileName":"Auth0+AWS.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"FR","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2I97Q4nnQeZcCIc9IiZAoP","type":"Asset","createdAt":"2021-03-25T14:47:35.840Z","updatedAt":"2021-03-26T16:51:42.908Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"Auth0-Securite-dans-le-Cloud-Thumbnail","file":{"url":"//images.ctfassets.net/2ntc334xpx65/2I97Q4nnQeZcCIc9IiZAoP/55cdc9c5ee1f9c1152e4d724f3a56c30/Auth0-Securite-dans-le-Cloud-Thumbnail.png","details":{"size":1543924,"image":{"width":1162,"height":1162}},"fileName":"Auth0-Securite-dans-le-Cloud-Thumbnail.png","contentType":"image/png"}}},"ocid":"7014z000001cbAoAAI-aPA4z0000000133GAA"},{"type":"webinars","updatedAt":"2022-09-09T03:03:11.493Z","title":"OpenID Connect とは何か?","id":"jp-the-openid-connect-webinar","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3drMsHnrgkERsVtERBSIZn","type":"Asset","createdAt":"2020-03-18T05:41:58.500Z","updatedAt":"2020-03-18T05:41:58.500Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"CoverImage-webimar-OIDC","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3drMsHnrgkERsVtERBSIZn/b0960420fbf501a149a8b22aafa75225/CoverImage-webimar-OIDC.png","details":{"size":315091,"image":{"width":600,"height":856}},"fileName":"CoverImage-webimar-OIDC.png","contentType":"image/png"}}},"description":"認証について調べていると、必ずは見かけるであろう OpenID Connect 。OpenID Connect に関する様々な情報がネット上にはありますが、それらから正確に OpenID Connect が何であるか理解するのは、かなり難しいと思います。\nこの Webinar ではゲストに Auth0 Ambassador であり、OpenID Foundation Japan の理事を務められている富士榮 尚寛さんをお迎えし、OpenID ができるまでの経緯や Auth0 と OpenID Connect についてなどお話いただきました。\nOpenID Connectの基礎について知りたい方、ぜひこちらご覧ください。","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1YZYU4EyDC6X6l317e5pjL","type":"Asset","createdAt":"2020-03-18T05:40:30.572Z","updatedAt":"2020-03-24T18:08:48.303Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"locale":"en-US"},"fields":{"title":"TC-WEBINAR-OIDC","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1YZYU4EyDC6X6l317e5pjL/be4c6abd0ced5c9154cd6ff7ab53a322/TC-WEBINAR-OIDC.png","details":{"size":594219,"image":{"width":2400,"height":1260}},"fileName":"TC-WEBINAR-OIDC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"2XnOmkwZSWMQuvIKXTt3fY","type":"Asset","createdAt":"2020-03-23T12:03:49.015Z","updatedAt":"2020-03-23T12:03:49.015Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Webinar OIDC final","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/2XnOmkwZSWMQuvIKXTt3fY/41b615e9beb4e3f364ac553341d19ecf/Webinar_OIDC_final.mp4","details":{"size":958640103},"fileName":"Webinar_OIDC_final.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"language":"JP","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"czRVxFov9TAZGSKz1wuHi","type":"Asset","createdAt":"2020-09-30T21:05:30.776Z","updatedAt":"2020-09-30T21:05:30.776Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"OpenID Connect","file":{"url":"//images.ctfassets.net/2ntc334xpx65/czRVxFov9TAZGSKz1wuHi/3507843ddf00d854348a51df6c918d06/resource_thumb_49.jpg","details":{"size":47391,"image":{"width":581,"height":388}},"fileName":"resource_thumb_49.jpg","contentType":"image/jpeg"}}},"ocid":"7014z000001cb1OAAQ-aPA4z000000011NGAQ"},{"type":"webinars","updatedAt":"2021-06-03T22:48:46.563Z","title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","id":"tekaris-partner-webinar","marketo_form_id":0,"image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7ojY9VA3N1gmSPja0Y9v6S","type":"Asset","createdAt":"2021-06-03T21:45:08.958Z","updatedAt":"2021-06-03T21:45:08.958Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7ojY9VA3N1gmSPja0Y9v6S/ace3e8d67b93595d27008349d2c5078b/Auth0-Resource_Cover-Tekaris-GC.png","details":{"size":260059,"image":{"width":600,"height":856}},"fileName":"Auth0-Resource Cover-Tekaris-GC.png","contentType":"image/png"}}},"description":"Die meisten Firmen bieten Ihren Geschäftskunden und -Partnern Portale und APIs, um auf Services und Daten zuzugreifen. Neben den vielen Vorteilen dieser Applikationen steigen allerdings auch die Anforderungen an Sicherheit und Compliance, um Nutzer-Zugänge zu verwalten und zu überwachen. Vor allem in der B2B-Welt kann ein “Do it yourself” Ansatz hier schnell teuer und zum Sicherheitsrisiko werden. \n\nIn diesem Webinar zeigen Konrad Pfeffer von der Tekaris und Tobias Urban von Auth0, wie Sie mit einer modernen Identitäts- und Access Management Lösung nicht nur kostengünstig und schnell Ihre Anwendungen absichern können, sondern auch die Potentiale, die Sie für Ihr Geschäft heben können. Konkret wird aufgezeigt, wie:\n\n- Authentifizierung in Apps und API‘s sicher und benutzerfreundlich umgesetzt und gleichzeitig Ihr Geschäft unterstützt werden kann\n- Sie mit “Identity Federations“ sicher mit anderen Firmen zusammenarbeiten können und gleichzeitig Support-Aufwände minimieren\n- Sie die Rechteverwaltung Ihrer Kundenzugänge organisieren und delegieren können","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"4zwyQsYwmyc5W6DkMJlka7","type":"Asset","createdAt":"2021-06-03T21:47:30.532Z","updatedAt":"2021-06-03T21:49:18.341Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","file":{"url":"//images.ctfassets.net/2ntc334xpx65/4zwyQsYwmyc5W6DkMJlka7/56fa1ef050fb9d997a3530271466dc07/Auth0-Share-asset-Tekaris-GC.png","details":{"size":336436,"image":{"width":1250,"height":608}},"fileName":"Auth0-Share-asset-Tekaris-GC.png","contentType":"image/png"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"k3GuHpAQ5sveurrVM9zlU","type":"Asset","createdAt":"2021-06-03T21:53:38.166Z","updatedAt":"2021-06-03T21:53:38.166Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/k3GuHpAQ5sveurrVM9zlU/f65ac98ed6d910f653452444b0e28c13/Erfolgreiche_Apps__amp__APIs_im_B2B-Gesch__ft-_cloud-based_Identity-Management_f__r_zufriedene_Kunden.mov","details":{"size":139151350},"fileName":"Erfolgreiche Apps \u0026amp; APIs im B2B-Geschäft- cloud-based Identity-Management für zufriedene Kunden.mov","contentType":"video/quicktime"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"DE","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"188R51GeONAgxs90FkfTiZ","type":"Asset","createdAt":"2021-06-03T21:48:40.294Z","updatedAt":"2021-06-03T21:48:40.294Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Erfolgreiche Apps \u0026 APIs im B2B-Geschäft","file":{"url":"//images.ctfassets.net/2ntc334xpx65/188R51GeONAgxs90FkfTiZ/6434731792ec353bdbee1c7ffb655414/Auth0-Share-asset-Tekaris-GC-Square.png","details":{"size":2319693,"image":{"width":2267,"height":2267}},"fileName":"Auth0-Share-asset-Tekaris-GC-Square.png","contentType":"image/png"}}}},{"type":"webinars","updatedAt":"2020-09-29T18:24:20.166Z","title":"Auth0 + Computerwoche: Komfort und Sicherheit im Identity Management","id":"komfort-und-sicherheit-im-identity-management","image_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3pJHvEv86aqn8esqhqALQp","type":"Asset","createdAt":"2020-09-23T00:23:53.983Z","updatedAt":"2020-09-23T00:23:53.983Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Komfort und Sicherheit im Identity Management Image","file":{"url":"//images.ctfassets.net/2ntc334xpx65/3pJHvEv86aqn8esqhqALQp/3a53abc1634c666bb4e47d839d7fbf00/Resources_Page__Cover.jpeg","details":{"size":67679,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover.jpeg","contentType":"image/jpeg"}}},"description":"Urlaubsbuchung, Online-Shopping oder Banking – fast jeder Verbraucher hat mittlerweile mehrere digitale Konten für unterschiedlichste Zwecke im Einsatz - und täglich werden es mehr. Das haben auch Cyberkriminelle erkannt, die es auf Daten- oder Identitätsdiebstahl abgesehen haben.\n\nDeshalb verschärfen die Anbieter dieser Dienste ständig ihre Sicherheitsanforderungen. Allzu oft geschieht das jedoch auf Kosten der Benutzerfreundlichkeit: Das Kundenerlebnis leidet, die Zugangsprozesse sind zu kompliziert.\n\nIn unserem Webcast mit Auth0 erfahren Sie unter anderem:\n\n- Wie Unternehmen Sicherheit und Benutzerfreundlichkeit im Identity- und Access-Management in Einklang bringen können.\n- Wie hierbei Security By Design zum Einsatz kommt.\n- Wie es Cyberkriminellen dadurch erschwert wird, auf Kundendaten zuzugreifen.\n- Was zeitgemäßes Passwort-Management ausmacht.","twitter_card_image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"1OtU1z6gQlZIL3jZaG5Zgh","type":"Asset","createdAt":"2020-09-23T00:24:09.568Z","updatedAt":"2020-09-23T00:24:09.568Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"UX und Sicherheit im Identity management Share","file":{"url":"//images.ctfassets.net/2ntc334xpx65/1OtU1z6gQlZIL3jZaG5Zgh/52248a0d3468b7f29b6fd05fae770c0b/Resources_Page__Cover__1_.jpeg","details":{"size":67679,"image":{"width":600,"height":856}},"fileName":"Resources Page_ Cover (1).jpeg","contentType":"image/jpeg"}}},"video":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3Crkzv20qCv12lpIAbSnND","type":"Asset","createdAt":"2020-09-23T00:24:16.442Z","updatedAt":"2020-09-23T00:24:16.442Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 + Computerwoche Present: Komfort und Sicherheit im Identity Management","file":{"url":"//videos.ctfassets.net/2ntc334xpx65/3Crkzv20qCv12lpIAbSnND/cd6c463953bad3d63a90b378b680e136/Computerwoche___Auth0_Webcast.mp4","details":{"size":990247735},"fileName":"Computerwoche : Auth0 Webcast.mp4","contentType":"video/mp4"}}},"lead_data_is_required":true,"author":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"3SsqBPFn442s4qEqiIkI6y","type":"Entry","createdAt":"2018-03-06T15:35:44.656Z","updatedAt":"2021-05-10T21:17:40.463Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"author"}},"locale":"en-US"},"fields":{"full_name":"Auth0","avatar_url":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"7xwGomgGQpkGyi4G0Mbtyv","type":"Asset","createdAt":"2021-05-10T21:16:53.164Z","updatedAt":"2021-05-11T18:47:48.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"locale":"en-US"},"fields":{"title":"brand evolution logo Auth0 black","file":{"url":"//images.ctfassets.net/2ntc334xpx65/7xwGomgGQpkGyi4G0Mbtyv/660a654301d8ed502a53bc5f1f497fd3/author-logo-new-branding.png","details":{"size":8363,"image":{"width":602,"height":378}},"fileName":"author-logo-new-branding.png","contentType":"image/png"}}},"bio":"We solve the most complex identity use cases with an extensible and easy to integrate platform that secures billions of logins every month"}},"language":"DE","imageThumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"2ntc334xpx65"}},"id":"5P7U5FJtgX45aJvJ39MqFs","type":"Asset","createdAt":"2020-09-29T18:24:14.209Z","updatedAt":"2020-09-29T18:24:14.209Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Auth0 + Computerwoche","file":{"url":"//images.ctfassets.net/2ntc334xpx65/5P7U5FJtgX45aJvJ39MqFs/e6c75be44a09e13b97fcf5950039d3c3/resource_thumb_62.jpg","details":{"size":46744,"image":{"width":581,"height":388}},"fileName":"resource_thumb_62.jpg","contentType":"image/jpeg"}}}}],"resourcesType":"webinars","metadata":{"noindex":false,"customPath":null,"title":"Webinars - Events, Introductions, and Testimonials | Auth0","description":"Check out all Auth0 Webinars. We've put together incredible lineup of live meetings with partners and customers exploring the complex world of identity.","image":{"url":"https://images.ctfassets.net/kbkgmx9upatd/6XofntRrGGq27KAtEiWknO/d607977f37605f2e80a5ac2f04e8735e/thumb-resources__1_.png","mimeType":"image/png"}},"lang":"de"},"__N_SSG":true},"page":"/[lang]/resources/[resourcesType]","query":{"lang":"de","resourcesType":"webinars"},"buildId":"Yof3ibkw2yhtaOc5FW4rP","assetPrefix":"/b2b-enterprise-identity-management","isFallback":false,"gsp":true,"customServer":true,"scriptLoader":[]}</script></body></html>