Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jared

๐Ÿ‘ค Speaker
5113 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Exactly. There's companies out there who specialize in this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Exactly. There's companies out there who specialize in this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But isn't the money an enterprise? I mean...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But isn't the money an enterprise? I mean...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's because we are the truck drivers of the software world. Yeah. And we can even be a little over the top every once in a while.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's because we are the truck drivers of the software world. Yeah. And we can even be a little over the top every once in a while.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Dan, if you were starting a software business today and you wanted people to authenticate against your website in order to do stuff and you make money once they're signed in and you want to make sure that they can get it in and they can get their stuff, but also their stuff secure. And like, what would your solution look like for a developer trying to build today?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Dan, if you were starting a software business today and you wanted people to authenticate against your website in order to do stuff and you make money once they're signed in and you want to make sure that they can get it in and they can get their stuff, but also their stuff secure. And like, what would your solution look like for a developer trying to build today?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So there is no silver bullet. I was hoping you'd just give us one. You could just tell us what to do. Dan Moore told me to do this, and so I'm going to do it. But no, I had to actually think about my own use case and apply thought processes. That's no fun.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So there is no silver bullet. I was hoping you'd just give us one. You could just tell us what to do. Dan Moore told me to do this, and so I'm going to do it. But no, I had to actually think about my own use case and apply thought processes. That's no fun.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I didn't say... No, he was going to say listener and user. He was going to say listener and he was going to say user. And he called them losers.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I didn't say... No, he was going to say listener and user. He was going to say listener and he was going to say user. And he called them losers.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's right. Unless you go to Chainsaw.com and you get your magic link. Here's the nice thing about it is we never expire that cookie, baby. So do it once. Just keep your browser not flushed, and you never have to do it again unless you're switching to a different context.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's right. Unless you go to Chainsaw.com and you get your magic link. Here's the nice thing about it is we never expire that cookie, baby. So do it once. Just keep your browser not flushed, and you never have to do it again unless you're switching to a different context.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's right, and then you're just good to go for the remainder of that machine. Bam. Well, we didn't have time for it on this particular show, but there is a very interesting article out on FusionAuth's blog by Dan called Building a Self-Hostable Product. If you want more Dan Moore expertise, we'll link that up in the show notes for folks to go and check. listen to.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's right, and then you're just good to go for the remainder of that machine. Bam. Well, we didn't have time for it on this particular show, but there is a very interesting article out on FusionAuth's blog by Dan called Building a Self-Hostable Product. If you want more Dan Moore expertise, we'll link that up in the show notes for folks to go and check. listen to.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Aside from that, Dan, what's the best place to connect with you on the internet?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Aside from that, Dan, what's the best place to connect with you on the internet?