Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

Over the top auth strategies (Friends)

1754.78 - 1778.627 Dan Moore

It depends, but we can deploy to any of the AWS regions. And you can run it yourself too, right? So you can run it in your own data center. But the idea there is that if you escape a competitor who has a multi-tenant in SaaS, depending on their security posture, you may be able to access other users' systems, but you can't inside FusionAuth because it's separated. That's smart.

0
💬 0

Comments

There are no comments yet.

Log in to comment.