|
Add timestamp field to track when user accounts were blocked
|
|
0
|
1
|
January 23, 2026
|
|
Why Broken Access Control Still Dominates the OWASP Top 10 in 2026?
|
|
1
|
1
|
January 23, 2026
|
|
Feature Request: Ability to Invalidate Auth0 Session Cookies During Signup / Aborted Authentication Flows
|
|
0
|
3
|
January 18, 2026
|
|
Demystifying OAuth Security: State vs. Nonce vs. PKCE
|
|
1
|
24
|
November 28, 2025
|
|
Protect Your Access Tokens with DPoP (Demonstrating Proof of Possession)
|
|
1
|
48
|
August 25, 2025
|
|
Ability to disable username/email address autocomplete on signup/login flows
|
|
1
|
17
|
August 29, 2025
|
|
Make Content-Security-Policy frame-ancestors directive configurable for New Universal Login
|
|
17
|
5237
|
July 29, 2025
|
|
OAuth 2.0 Access Tokens and the Principle of Least Privilege
|
|
1
|
32
|
July 17, 2025
|
|
RFC 7636 violation - Weak enforcement of PKCE parameters in OAuth 2.0 implementation
|
|
2
|
97
|
July 15, 2025
|
|
Identity: The Critical Link in Retail and Hospitality’s Digital Future
|
|
1
|
22
|
May 8, 2025
|
|
Generate More Secure Code With AI-Powered Tools
|
|
1
|
22
|
April 17, 2025
|
|
Better User Experiences, Stronger Security
|
|
1
|
17
|
April 9, 2025
|
|
Designing Apps for Growth: How a Layered Identity Solution Helps You Win
|
|
1
|
23
|
February 25, 2025
|
|
The Rise of AI Agents and the Security Challenges Ahead
|
|
1
|
49
|
February 19, 2025
|
|
Tool Calling in AI Agents: Empowering Intelligent Automation Securely
|
|
1
|
38
|
February 14, 2025
|
|
Identity Security 101: How to Drive Trust and Loyalty across the User Journey
|
|
1
|
38
|
February 12, 2025
|
|
Bring Your Own Key (BYOK) in Auth0
|
|
1
|
63
|
December 11, 2024
|
|
Block IPv6 range
|
|
2
|
2017
|
November 21, 2024
|
|
Allowing app to be used in iFrames for custom domains
|
|
7
|
5115
|
November 17, 2024
|
|
Activate Passkeys and Let Your Users Log in without a Password
|
|
9
|
1749
|
October 31, 2024
|
|
Streamlining API Security with AWS Lambda Authorizers and Okta FGA
|
|
1
|
39
|
October 28, 2024
|
|
Can I Skip Verification of Information Encoded in JWTs?
|
|
2
|
153
|
October 11, 2024
|
|
Highly Regulated Identity: The key to easier, more secure customer interactions
|
|
0
|
185
|
August 16, 2024
|
|
Token from "getAccessTokenSilently" in frontend insecure?
|
|
6
|
339
|
June 21, 2024
|
|
Feature request for Auth0: provide security notification email templates
|
|
0
|
217
|
May 1, 2024
|
|
Facial Biometrics: The Key to Digital Transformation and Enhanced Security
|
|
1
|
280
|
April 11, 2024
|
|
Security Considerations in the Time of AI Engineering
|
|
1
|
258
|
April 4, 2024
|
|
Post-Quantum Cryptography: Preparing for the Future of Security
|
|
1
|
280
|
March 27, 2024
|
|
Add Security and Authorization to a Java Spring Boot API
|
|
1
|
314
|
March 20, 2024
|
|
OAuth 2.0 Security Enhancements
|
|
1
|
478
|
December 22, 2023
|