
The Changelog: Software Development, Open Source Over the top auth strategies (Friends)
17 snips
Jan 31, 2025 Dan Moore from FusionAuth, an expert in authentication strategies, dives into the world of secure user access. He breaks down modern authentication methods like magic links, OTPs, and passkeys. The discussion highlights the balance between security and user experience, exploring challenges with third-party logins and password managers. Dan shares insights on multi-factor authentication and the importance of evolving strategies for different user demographics. His practical tips and anecdotes make the complex landscape of authentication both relatable and informative.
AI Snips
Chapters
Transcript
Episode notes
Offer Passwords, Encourage Password Managers
- Offer password-based authentication because it's user-friendly and shareable.
- However, promote password manager usage due to security concerns.
Password Persistence
- Passwords are here to stay due to ease of sharing and wide adoption.
- Their strength (simplicity) is also their weakness (security vulnerability).
Dedicated Resources for Enhanced Security
- FusionAuth offers dedicated database and compute resources for enhanced security.
- This is unlike multi-tenant SaaS solutions where a breach can potentially compromise other users.

