BlogDocumentation
Products
Identity ProtectionIdentity ManagementBlogDocumentation

Blog

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Achieving Least Privilege: Unused Entitlement Removal
Achieving Least Privilege: Unused Entitlement Removal

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Vincenzo Iozzo
Vincenzo Iozzo
JWT Implementation Pitfalls, Security Threats, and Our Approach to Mitigate Them

Deep Dives

/ 21 Sep, 2023

JWT Implementation Pitfalls, Security Threats, and Our Approach to Mitigate Them

JSON Web Tokens (JWTs) are one of the most common ways to transfer identity claims and prove the identity of a user or an entity. JWTs have become very popular in recent years because they are easy to use, read, and debug.

JWTs provide a lot of flexibility at the expense of several security risks that are often overlooked. In this article, we'll discuss common risks when implementing or manipulating JWTs and our approach to avoiding them.

Vincenzo Iozzo
Vincenzo Iozzo
No-code anti-phishing protection of internal apps with Passkeys

Tutorial

/ 18 Sep, 2023

No-code anti-phishing protection of internal apps with Passkeys

Phishing is one of the most common causes of data breaches. According to Verizon's DBIR report, over 50% of incidents start with phishing or stolen credentials. WebAuthn/Passkeys are an effective way to stop phishing and credential stealing attempts on their tracks.

In this article, we’ll show how you can use Gate to enforce Passkeys authentication for users without modifying the application code.

Vincenzo Iozzo
Vincenzo Iozzo
Firewalling OpenAI APIs: Data loss prevention and identity access control

Tutorial

/ 14 Sep, 2023

Firewalling OpenAI APIs: Data loss prevention and identity access control

Large Language Models (LLMs) have taken the world by storm, and they are now used for many tasks by consumers and enterprises alike. However, the risk of accidentally disclosing sensitive data to the models is very high as the recent Samsung case shown.

In this article, we’ll show how you can use Gate to detect sensitive data in requests sent to the OpenAI APIs, as well as enforcing access control so that only users with certain roles can access the APIs.

Vincenzo Iozzo
Vincenzo Iozzo
Ditch your organizations table

New Feature

/ 12 Sep, 2023

Ditch your organizations table

Suborgs make it effortless and secure to implement complex identity structures such as multi-tenancy B2B apps and multi sided marketplaces.

Vincenzo Iozzo, Joseph Gardner
Vincenzo Iozzo, Joseph Gardner
Vincenzo Iozzo, Joseph Gardner
Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

Tutorial

/ 5 Sep, 2023

Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

Adequately protecting APIs is key to avoid data leaks and breaches.

Just recently, an exposed API allowed an attacker to scrape over 2.6 million records from Duolingo.

In this article, we’ll show how you can use Gate to detect, respond to, and prevent these kinds of incidents.

Vincenzo Iozzo
Vincenzo Iozzo
Docusaurus - Authentication and authorization with SlashID

Open Source

/ 28 Aug, 2023

Docusaurus - Authentication and authorization with SlashID

The latest docusaurus-slashid-login theme adds finer grained access control to your Docusaurus website.

Ivan Kovic
Ivan Kovic
Authenticate your Shopify customers with SlashID

New Feature

/ 25 Jul, 2023

Authenticate your Shopify customers with SlashID

The new SlashID Login app for Shopify lets your customers authenticate seamlessly using quick and safe methods like passkeys, social login and magic links.

Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Ivan Kovic, Kasper Mroz, Matilde Stefanini, Vincenzo Iozzo
Synchronous Webhooks

New Feature

/ 20 Jul, 2023

Synchronous Webhooks

We are excited to release synchronous webhooks, the latest addition to our webhooks features.

With synchronous webhooks, you can extend SlashID Access to suit your business needs in a few simple steps, in whatever language and environment makes sense for you.

Joseph Gardner
Joseph Gardner
Building a React Login Page Template

Tutorial

/ 16 Jul, 2023

Building a React Login Page Template

Discover how to create a secure login page for your React app with authentication and styling using SlashID.

Ivan Kovic
Ivan Kovic
1 2 3 4 5 6

Ready to start a top-tier security upgrade?

Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Identity Protection Identity Management

Resources

Blog Get in touch

We use cookies to improve your experience. Read our cookie policy.