What are the downsides of matching by email in SSO logins (e.g. Google, Facebook, Apple, Microsoft)?

Context
I’ve read somewhere that one should not match by email (e.g. the email given by the Google JWT token) when using SSO (e.g. OpenID Connect) but it’s not clear to me why.
The recommended approach seems to be using aud and sub claims … Continue reading What are the downsides of matching by email in SSO logins (e.g. Google, Facebook, Apple, Microsoft)?

Is it currently considered strong security to store the encrypted data and encryption key in the same database? [duplicate]

In 2024, is it considered safe to encrypt user data, store the encryption keys in the database, and protect them with user credentials? Deriving keys from user password is not ideal in my design. My plan is to allow OAuth-based authentica… Continue reading Is it currently considered strong security to store the encrypted data and encryption key in the same database? [duplicate]

Why shouldn’t I use the OAuth password grant if I have to implement a custom username+password login anyway?

I’m building a web REST API. Users must be able to authenticate themselves to this API.
I don’t know ahead of time which clients will want to use the API. I want to allow for the possibility of anyone creating their own client, like a cust… Continue reading Why shouldn’t I use the OAuth password grant if I have to implement a custom username+password login anyway?

Product showcase: How to track SaaS security best practices with Nudge Security

As technology adoption has shifted to be employee-led, IT and security teams are contending with an ever-expanding SaaS attack surface. At the same time, they are often spread thin, meaning they need ways to quickly identify and prioritize the highest-… Continue reading Product showcase: How to track SaaS security best practices with Nudge Security

Risks with having a "localhost" service configured on a production SAML/OAuth/OIDC Identity Provider

To help developers with integrating with our SAML/OAuth/OIDC Identity Provider on their local dev environments, I’m thinking about configuring a demo client/app in our production IdP that has localhost configured as valid redirect url (OAu… Continue reading Risks with having a "localhost" service configured on a production SAML/OAuth/OIDC Identity Provider

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution