The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)
Dan Moore
It depends, but we can deploy to any of the AWS regions. And you can run it yourself too, right? So you can run it in your own data center. But the idea there is that if you escape a competitor who has a multi-tenant in SaaS, depending on their security posture, you may be able to access other users' systems, but you can't inside FusionAuth because it's separated. That's smart.
0
💬
0
Comments
Log in to comment.
There are no comments yet.