BlogDocumentation
Products
Identity ProtectionIdentity ManagementBlogDocumentation

Blog

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Achieving Least Privilege: Unused Entitlement Removal
Achieving Least Privilege: Unused Entitlement Removal

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Vincenzo Iozzo
Vincenzo Iozzo
ODPR: A Framework for Securing Non-Human Identities

Security

/ 17 Jun, 2024

ODPR: A Framework for Securing Non-Human Identities

Identity-based attacks have become the primary way attackers move laterally in a network. They are also responsible for half of the initial intrusions.

Addressing these attacks requires very different tooling and approaches compared to malware-based attacks.

In this article we delve into the SlashID framework to address these attacks.

Ben Reinheimer
Ben Reinheimer
Credential Tokenization: Protecting third-party API credentials

New Feature

/ 10 Jun, 2024

Credential Tokenization: Protecting third-party API credentials

Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments.

In this blog post we introduce credential tokenization to protect secrets at runtime, introduce separation of duties, and reduce the credential rotation burden.

Vincenzo Iozzo
Vincenzo Iozzo
Secure API and M2M Access with OAuth2 Client Credentials and SlashID's sidecar

New Feature

/ 3 Jun, 2024

Secure API and M2M Access with OAuth2 Client Credentials and SlashID's sidecar

The recent Hugging Face breach is yet another reminder that securing machine-to-machine communication and API access is essential today.

By leveraging OAuth2 Client Credentials, you can enhance security, enable fine-grained access control, simplify credential management, and benefit from a standards-based approach.

Vincenzo Iozzo
Vincenzo Iozzo
Introducing Organization Attributes

New Feature

/ 14 May, 2024

Introducing Organization Attributes

With organization attributes, you can now easily store and manage tenant-level data directly on our platform.

Vincenzo Iozzo
Vincenzo Iozzo
Introducing Anonymous Users: Balancing First-Party Data Collection and User Experience

New Feature

/ 24 Apr, 2024

Introducing Anonymous Users: Balancing First-Party Data Collection and User Experience

With the deprecation of third-party cookies, first-party data has become crucial for websites to personalize user experiences.

SlashID introduces Anonymous Users, a feature that allows websites to collect user data without forcing users to register or log in, striking the perfect balance between data collection and user experience.

Vincenzo Iozzo
Vincenzo Iozzo
SlashID SDK for PHP and Laravel authentication

Product Releases

/ 2 Apr, 2024

SlashID SDK for PHP and Laravel authentication

While very popular, PHP lacks modern identity and access management (IAM) capabilities. SlashID changes that with the release of our SDK for PHP and Laravel.

This is just the beginning; according to W3Tech PHP is used by over 76% of indexed websites. In the weeks to come, we aim to cover other popular frameworks such as Drupal and Symfony.

Vincenzo Iozzo
Vincenzo Iozzo
Adding custom claims to identity tokens

Deep Dives

/ 6 Mar, 2024

Adding custom claims to identity tokens

Adding custom claims to JWTs allows you to share identity information without repeated queries to external data sources.

Read on to learn how to customize claims with SlashID's webhooks.

Vincenzo Iozzo
Vincenzo Iozzo
SlashID: Building a globally distributed Identity Platform

New Feature

/ 19 Feb, 2024

SlashID: Building a globally distributed Identity Platform

We built the SlashID infrastructure so that your user data is globally distributed.

Our architecture helps applications using SlashID benefit from dramatically reduced latency, high availability and comply with data protection laws without fragmented identity silos or extra fees.

Vincenzo Iozzo, Robert Laszczak
Vincenzo Iozzo, Robert Laszczak
Vincenzo Iozzo, Robert Laszczak
Passkeys Adoption Trends: Survey from Large Deployments

Deep Dives

/ 31 Jan, 2024

Passkeys Adoption Trends: Survey from Large Deployments

In this comprehensive blog post, we delve into the publicly available data on large-scale passkeys rollouts, examining results, conversion rates, and implementation challenges as documented in engineering blogs by companies like Kayak and Yahoo Japan.

Vincenzo Iozzo
Vincenzo Iozzo
1 2 3 4 5 6

Ready to start a top-tier security upgrade?

Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Identity Protection Identity Management

Resources

Blog Get in touch

We use cookies to improve your experience. Read our cookie policy.