Auth0 MAU Explained: How to Calculate and Optimize Your Costs Learn how Auth0 calculates Monthly Active Users (MAU) and get three actionable tips for Auth0 cost optimization, including testing, SSO,
Demystifying OAuth Security: State vs. Nonce vs. PKCE Learn the critical differences between OAuth State, Nonce, and PKCE. Discover how these parameters prevent CSRF, replay attacks, and code ...
Hiding Prompts in Plain Sight: A New AI Security Risk Discover why standard prompt injection is evolving into a greater threat with AI browsers. Learn about indirect injection risks and how t ...
Client ID Metadata Documents Are the Future of MCP Client Registration Learn why Client ID Metadata Documents (CIMD) are replacing Dynamic Client Registration (DCR) in the Model Context Protocol (MCP) ecosyst ...
A Comprehensive Guide to Auth0 Security Against Identity Attacks A deep-dive guide for developers on essential Auth0 security best practices. Learn to prevent misconfigurations, account fraud, MFA bypas ...
Secure Your AI Agents: The Power is Already in Your Auth0 Plan Auth0 for AI Agents extends your existing plan to cover AI authentication, letting you build and deploy agents faster.
Auth0 for AI Agents is Now Generally Available (GA) Auth0 for AI Agents is here! Give users control by securing B2B, B2C, and internal apps with User Authentication, Async Auth, Token Vault ...
Proactive Auth0 Security Posture via Real-Time Audit of Management API Logs Prevent configuration drift. Detect changes to critical security defenses like MFA and Attack Protection real-time, leveraging Auth0 Mana ...
Auth0 CLI: Leveling Up Your Developer Workflow with Powerful Enhancements Discover the recent Auth0 CLI enhancements, built for deeper API coverage, interactive logs, and streamlined automation based on communit ...
NET 10: What's New for Authentication and Authorization Explore what's new in .NET 10 for authentication and authorization. Learn about passkeys support, C# 14 claim management, new metrics, an ...
The Three Laws of AI Security Learn a new framework for AI security based on Asimov's Laws. See how to control non-deterministic LLMs and secure your data, tool access ...