Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Dan Moore

👤 Person
204 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, thanks for having me back.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, thanks for having me back.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Jared's not afraid. Too many letters.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Jared's not afraid. Too many letters.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, so I've been for the last about... four years, I've been working for an auth provider called FusionAuth, and I've done a variety of roles there and spent a lot of time talking to customers about how to implement auth, a lot of educational content. And when I say auth, you know, it's authentication, authorization, and user management.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, so I've been for the last about... four years, I've been working for an auth provider called FusionAuth, and I've done a variety of roles there and spent a lot of time talking to customers about how to implement auth, a lot of educational content. And when I say auth, you know, it's authentication, authorization, and user management.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

There are some other aspects of the authentication or user lifecycle that we don't really focus on, like identity verification or kind of workforce-oriented stuff. We're much more focused on customer identity access management. So that's my expertise.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

There are some other aspects of the authentication or user lifecycle that we don't really focus on, like identity verification or kind of workforce-oriented stuff. We're much more focused on customer identity access management. So that's my expertise.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And that, you know, learned about OAuth and SAML and OIDC and JOTS, you know, basically alphabet soup in terms of jargon, but spent a lot of time decoding that and taking it, rewriting it or rewriting my understanding in such a way that developers would actually be able to apply it kind of in their day-to-day life.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And that, you know, learned about OAuth and SAML and OIDC and JOTS, you know, basically alphabet soup in terms of jargon, but spent a lot of time decoding that and taking it, rewriting it or rewriting my understanding in such a way that developers would actually be able to apply it kind of in their day-to-day life.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Enough time for people to be distracted. Right. And like, like move away, go back to hacker news or listening to the change log or whatever they're doing before. And then they forget why they, why was that on the site? Yeah.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Enough time for people to be distracted. Right. And like, like move away, go back to hacker news or listening to the change log or whatever they're doing before. And then they forget why they, why was that on the site? Yeah.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's interesting because the bigger issue we've seen around magic links actually is corporate link checkers and expiring the links. And we've gone to some pretty extensive lengths to try to fix that problem.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's interesting because the bigger issue we've seen around magic links actually is corporate link checkers and expiring the links. And we've gone to some pretty extensive lengths to try to fix that problem.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

but it's it's kind of the same kind of thing right like you're doing something that's a little bit out of band and you don't have kind of control over that whole experience right whether it takes well for the email to be delivered or the emails being read by something else and expiring a one-time code or something like that so i actually hit that as well what do you guys do about that we require like a

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

but it's it's kind of the same kind of thing right like you're doing something that's a little bit out of band and you don't have kind of control over that whole experience right whether it takes well for the email to be delivered or the emails being read by something else and expiring a one-time code or something like that so i actually hit that as well what do you guys do about that we require like a

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So I think we do a JavaScript post of the, so you take, you're taking a page and then the JavaScript on the page executes in posts, which is what actually logs you in. So those link checkers aren't smart enough to do that yet. And so that kind of means that when the user clicks, they're opening a browser and that browser's

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So I think we do a JavaScript post of the, so you take, you're taking a page and then the JavaScript on the page executes in posts, which is what actually logs you in. So those link checkers aren't smart enough to do that yet. And so that kind of means that when the user clicks, they're opening a browser and that browser's

← Previous Page 1 of 11 Next →