Email the Author
You can use this page to email Edited by Dan Moore about The Ultimate Guide to Outsourcing Your Auth.
About the Book
Almost every software application has users. In the online world, applications may have one or few users, if internal, or billions of users, if Facebook (hi Zuck!). Most applications customize functionality and the user interface for each user because of business rules or customer expectations.
Users are a fundamental entity. If you are building an application, you'll almost certainly have users. At FusionAuth, we've built a flexible auth system that makes managing users easy and secure. We talk to people about their auth systems every day and have helped plenty of folks migrate to FusionAuth from other systems, whether commercial, open source, or homegrown.
While modern auth systems can be quite complex, three pieces of functionality appear in almost every one: authentication, authorization and user management. When you are implementing an application, you can choose to build this functionality from scratch or use an existing auth system provider to outsource.
Much like you outsource your data management to a relational database system such as Postgresql, you can do the same with auth, with many of the same benefits.
This book will cover how to evaluate an auth system, risks you might encounter and how to mitigate them, and migration and implementation details.
About the Author
Dan Moore is head of developer relations at FusionAuth.