BlogDocumentation
Products
Identity ProtectionIdentity ManagementBlogDocumentation

Blog

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Achieving Least Privilege: Unused Entitlement Removal
Achieving Least Privilege: Unused Entitlement Removal

New Feature

/ 5 May, 2025

Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Vincenzo Iozzo
Vincenzo Iozzo
Adding Identity to Docusaurus

Open Source

/ 12 Nov, 2022

Adding Identity to Docusaurus

Today we are releasing the docusaurus-slashid-login theme as well as a fork of docusaurus-openapi-docs.

The slashid plugin enables you to add out of the box authentication to docusaurus. The docusaurus-openapi-docs fork allows you to autofill API keys data, API parameters and more through slashid user attributes.

Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo
Introducing Data Vault - Secure HSM-backed PII storage directly from the frontend

New Feature

/ 7 Nov, 2022

Introducing Data Vault - Secure HSM-backed PII storage directly from the frontend

Today we are releasing Data Vault, which allows the safe and compliant storage of sensitive user data directly from the frontend.

Data Vault takes care of data localization and protection transparently, without having to build ad-hoc infrastructure to handle encryption or key management and rotation.

Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo
Social logins in 5 minutes or less

New Feature

/ 1 Nov, 2022

Social logins in 5 minutes or less

Today we are releasing our OpenID Connect (OIDC) SSO module which you can use to add Social logins and OIDC-compatible SSO to your app in less than 5 minutes.

Social logins can significantly boost user registration - for instance, Pinterest reported a 47% registration increase after adding Google One Tap to their website.

Ivan Kovic
Ivan Kovic
App-layer cryptographic primitives for secure storage of user data

Deep Dives

/ 20 Oct, 2022

App-layer cryptographic primitives for secure storage of user data

In this blogpost we explore the cryptographic primitives and design decisions we made building our Data Vault module.

Our service is a globally replicated, field-level encrypted, data store to keep user data safe and compliant with Data Protection laws while improving UX by decreasing latency through data locality.

Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo
The good, the bad and the ugly of Apple Passkeys

Deep Dives

/ 23 Sep, 2022

The good, the bad and the ugly of Apple Passkeys

The widely anticipated Apple passkeys launch happened just a few weeks ago with the iOS 16 release.

Passkeys are a cross-device extension of FIDO credentials compatible with WebAuthn. They address the main UX issue of WebAuthn, cross-device credentials.

In this article we’ll explore the Apple passkeys implementation, how passkeys compare to traditional FIDO credentials and why the decision of Apple to get rid of device attestation and resident keys is a significant step back for security.

Vincenzo Iozzo
Vincenzo Iozzo
The Security and Regulatory Compliance Benefits of WebAuthn

Compliance

/ 14 Sep, 2022

The Security and Regulatory Compliance Benefits of WebAuthn

The WebAuthn standard helps you stop phishing and account takeover (ATO) attacks while maintaining HIPAA and SCA compliance.

WebAuthn is significantly safer than passwords, due to the way the keys are stored and because it prevents credential stuffing and reuse attacks.

Vincenzo Iozzo
Vincenzo Iozzo
Phishing Attacks – WebAuthn to the rescue

Security

/ 12 Sep, 2022

Phishing Attacks – WebAuthn to the rescue

Authentication token theft is on the rise, with the latest Uber breach demonstrating yet again the threat that it poses.

WebAuthn significantly reduces user experience friction and hence allows for more frequent authentication prompts, offsetting the need for long-lived tokens and significantly curbing the risk of phishing.

Vincenzo Iozzo
Vincenzo Iozzo
1 2 3 4 5 6

Ready to start a top-tier security upgrade?

Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Identity Protection Identity Management

Resources

Blog Get in touch

We use cookies to improve your experience. Read our cookie policy.