Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Dan Moore

👤 Person
204 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And each solution you offer kind of increases your marginal kind of market size of people who are willing to kind of log in. And that includes what we talked about magic links. We talked about social login. I think we're going to talk a little bit about pass keys and it's an, it's a yes. And rather than a, you know, we're going to move entirely from this solution to that solution.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And each solution you offer kind of increases your marginal kind of market size of people who are willing to kind of log in. And that includes what we talked about magic links. We talked about social login. I think we're going to talk a little bit about pass keys and it's an, it's a yes. And rather than a, you know, we're going to move entirely from this solution to that solution.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I can give you a list, right? Like, I mean, Key Cloak, Clerk, Zitadel, Ori. I mean, there's Propel Auth. There's a ton of these folks out there doing that. Totally.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I can give you a list, right? Like, I mean, Key Cloak, Clerk, Zitadel, Ori. I mean, there's Propel Auth. There's a ton of these folks out there doing that. Totally.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

October about zero for six and a half billion dollars.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

October about zero for six and a half billion dollars.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And like 20, it was like 20 X there. ARR.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And like 20, it was like 20 X there. ARR.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, so I want to... Actually, I want to push... Back on that a little bit because, and this is one of our kind of unique selling propositions, which is the only reason I interrupt Adam, is that with FusionAuth, you're actually getting dedicated database and compute resources. So it's totally separate. It's not a multi-tenant solution inside there.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, so I want to... Actually, I want to push... Back on that a little bit because, and this is one of our kind of unique selling propositions, which is the only reason I interrupt Adam, is that with FusionAuth, you're actually getting dedicated database and compute resources. So it's totally separate. It's not a multi-tenant solution inside there.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It depends, but we can deploy to any of the AWS regions. And you can run it yourself too, right? So you can run it in your own data center. But the idea there is that if you escape a competitor who has a multi-tenant in SaaS, depending on their security posture, you may be able to access other users' systems, but you can't inside FusionAuth because it's separated. That's smart.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It depends, but we can deploy to any of the AWS regions. And you can run it yourself too, right? So you can run it in your own data center. But the idea there is that if you escape a competitor who has a multi-tenant in SaaS, depending on their security posture, you may be able to access other users' systems, but you can't inside FusionAuth because it's separated. That's smart.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's a separate database. But I do want to talk... I mean, Adam was talking about the complexity of it. To me, it feels like the evolution, it's the same evolution as email, right? It used to be you were sending emails, you'd stand up like Postfix or I don't even remember those, you know, Sendmail.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's a separate database. But I do want to talk... I mean, Adam was talking about the complexity of it. To me, it feels like the evolution, it's the same evolution as email, right? It used to be you were sending emails, you'd stand up like Postfix or I don't even remember those, you know, Sendmail.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And then Sendgood came along and other mail providers came along and email deliverability became a more complex issue. And so it became something that was outsourceable. And a lot of people have made a lot of money doing that. And a lot of apps have been built on top of it. And it's a trade-off, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And then Sendgood came along and other mail providers came along and email deliverability became a more complex issue. And so it became something that was outsourceable. And a lot of people have made a lot of money doing that. And a lot of apps have been built on top of it. And it's a trade-off, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And if you are, you know, super bare bones and you're a Linux gearhead and you know how to set up send mail, you can still get by by doing that. But the vast majority of the world has changed and people have just acknowledged that, you It's not worth it. And I think auth is kind of undergoing that transition too.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And if you are, you know, super bare bones and you're a Linux gearhead and you know how to set up send mail, you can still get by by doing that. But the vast majority of the world has changed and people have just acknowledged that, you It's not worth it. And I think auth is kind of undergoing that transition too.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, I mean, OTPs are a great solution for sure. I mean, they still share some of the issue with magic links, right? Like in terms of the deliverability, like timeframe and a little bit of discontinuity there, but... they definitely step around a lot of the other complexities, whether it's browser-based stuff or the link checkers or whatnot.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, I mean, OTPs are a great solution for sure. I mean, they still share some of the issue with magic links, right? Like in terms of the deliverability, like timeframe and a little bit of discontinuity there, but... they definitely step around a lot of the other complexities, whether it's browser-based stuff or the link checkers or whatnot.