BlogDocumentation
Products
Identity ProtectionIdentity ManagementBlogDocumentation

Blog

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Achieving Least Privilege: Unused Entitlement Removal
Achieving Least Privilege: Unused Entitlement Removal

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Vincenzo Iozzo
Vincenzo Iozzo
SlashID Analytics Webhooks

New Feature

/ 10 Jun, 2023

SlashID Analytics Webhooks

We are excited to release SlashID analytics and webhooks, providing greater visibility and actionable insights into your authentication flows.

Joseph Gardner, Ivan Kovic
Joseph Gardner, Ivan Kovic
Joseph Gardner, Ivan Kovic
Passkeys - Threat modeling and implementation considerations

Deep Dives

/ 24 May, 2023

Passkeys - Threat modeling and implementation considerations

In this blog post, we review the current state of the technology from a security standpoint and we’ll discuss some critical aspects of passkey implementation.

Vincenzo Iozzo, Kasper Mroz
Vincenzo Iozzo, Kasper Mroz
Vincenzo Iozzo, Kasper Mroz
Authentication flows with SlashID

New Feature

/ 12 May, 2023

Authentication flows with SlashID

Implement MFA and Step-Up Authentication in React applications with SlashID.

Kasper Mroz, Ivan Kovic
Kasper Mroz, Ivan Kovic
Kasper Mroz, Ivan Kovic
Using Google Tink to sign JWTs with ECDSA

Tutorial

/ 20 Feb, 2023

Using Google Tink to sign JWTs with ECDSA

In this blog post, we will show how the Tink cryptography library can be used to create, sign, and verify JSON Web Tokens (JWTs), as well as to manage the cryptographic keys for doing so.

Joseph Gardner
Joseph Gardner
React SDK support for <Groups>

New Feature

/ 9 Feb, 2023

React SDK support for <Groups>

With the latest React SDK release we are introducing a new control component, <Groups>. You can use <Groups> to conditionally render parts of the UI depending on whether the authenticated user belongs to specific Groups.

Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo
Sign-in and Sign-up React component release

New Feature

/ 18 Jan, 2023

Sign-in and Sign-up React component release

Today we’re happy to announce the next step in that journey to deliver a streamlined, low friction onboarding experience to our customers with the release of our sign-up/sign-in form component.

Ivan Kovic
Ivan Kovic
Fetching Google Groups with SlashID SSO

New Feature

/ 16 Jan, 2023

Fetching Google Groups with SlashID SSO

Use SlashID to fetch Google Groups as part of a user authentication flow.

Vincenzo Iozzo
Vincenzo Iozzo
In-browser HSM-backed Encryption with Tink and Wasm

Experiments

/ 18 Dec, 2022

In-browser HSM-backed Encryption with Tink and Wasm

This post explores how to use Wasm to lift Tink to JavaScript and how you can leverage it to perform client-side encryption directly from the browser, backed with a master key stored in a HSM.

Vincenzo Iozzo
Vincenzo Iozzo
Official React SDK release

New Feature

/ 28 Nov, 2022

Official React SDK release

Today we’re excited to announce the public release of the official SlashID React SDK

In this blog post we’ll go over the design pillars, main features, and why we’re thrilled about what’s coming next.

Ivan Kovic
Ivan Kovic
1 2 3 4 5 6

Ready to start a top-tier security upgrade?

Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Identity Protection Identity Management

Resources

Blog Get in touch

We use cookies to improve your experience. Read our cookie policy.