auth0

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name
Published By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencerís holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : 
auth0, authentication, scalability, marks and spencers, authentication demand
    
Auth0
Published By: Auth0     Published Date: May 12, 2016
Letís be honest: If youíre just using one or two social providers for a simple web application, without needing a username/password database yourself, or any other more elaborate features, it is easy enough to DIY. By all means, leverage the basic authentication libraries you can find in any open source framework, and be done with it.
Tags : 
auth0, identity management, web application, framework, developer
    
Auth0
Published By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. Itís the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation
    
Auth0
Published By: Auth0     Published Date: May 16, 2016
The pre-eminent medical education and research organizations in the U.S. combine forces to help find cures to the most complex medical mysteries - with medical identity secured by Auth0.
Tags : 
medical, medical mysteries, medical identity, medical security
    
Auth0
Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code
    
Auth0
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.