Why SlashID
Identity ProtectionBlogDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing & Vishing AttemptsDiscover & Block Shadow AppsIdentity ProtectionBlogDocumentation

Blog

Product Releases

/ 7 Jan, 2026

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Today, we're excited to announce a new partnership between SlashID and Teleskope, bringing together industry-leading identity security and data security in a seamless, intelligence-driven integration.

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Product Releases

/ 7 Jan, 2026

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Today, we're excited to announce a new partnership between SlashID and Teleskope, bringing together industry-leading identity security and data security in a seamless, intelligence-driven integration.

SlashID Team
SlashID Team

Product Releases

/ 2 Apr, 2024

SlashID SDK for PHP and Laravel authentication

While very popular, PHP lacks modern identity and access management (IAM) capabilities. SlashID changes that with the release of our SDK for PHP and Laravel.

This is just the beginning; according to W3Tech PHP is used by over 76% of indexed websites. In the weeks to come, we aim to cover other popular frameworks such as Drupal and Symfony.

Vincenzo Iozzo
Vincenzo Iozzo

Deep Dives

/ 6 Mar, 2024

Adding custom claims to identity tokens

Adding custom claims to JWTs allows you to share identity information without repeated queries to external data sources.

Read on to learn how to customize claims with SlashID's webhooks.

Vincenzo Iozzo
Vincenzo Iozzo

New Feature

/ 19 Feb, 2024

SlashID: Building a globally distributed Identity Platform

We built the SlashID infrastructure so that your user data is globally distributed.

Our architecture helps applications using SlashID benefit from dramatically reduced latency, high availability and comply with data protection laws without fragmented identity silos or extra fees.

Vincenzo Iozzo, Robert Laszczak
Vincenzo Iozzo, Robert Laszczak
Vincenzo Iozzo, Robert Laszczak

Deep Dives

/ 31 Jan, 2024

Passkeys Adoption Trends: Survey from Large Deployments

In this comprehensive blog post, we delve into the publicly available data on large-scale passkeys rollouts, examining results, conversion rates, and implementation challenges as documented in engineering blogs by companies like Kayak and Yahoo Japan.

Vincenzo Iozzo
Vincenzo Iozzo

Security

/ 18 Jan, 2024

Single Sign-On implementation: Safely retrieving the email claim

A number of security issues have been discovered recently caused by the reliance on the email claim when using OpenID Connect (OIDC) for SSO.

In this blog post we'll review some of the major OIDC providers to discuss how to retrieve the claim safely

Joseph Gardner
Joseph Gardner

Security

/ 8 Jan, 2024

Single Sign-On implementation: Security Issues and Best Practices

Social logins and OpenID Connect (OIDC) are an extremely effective way to register new users with low friction.

There are many libraries out there that implement OIDC with several providers, however the implementation is very error-prone and can expose an application to account takeover attacks.

In this article, we’ll discuss the common security issues found in OAuth 2.0/OIDC login flows and best practices on how to avoid them.

Vincenzo Iozzo
Vincenzo Iozzo

New Feature

/ 2 Jan, 2024

Introducing the SlashID Remix SDK: Authentication made easy

We’re excited to announce first-party Remix support in SlashID with @slashid/remix. We've borrowed the power of our React SDK and aligned it with Remix's unique design patterns.

The Remix SDK makes authentication for Remix easy and seamless.

Jake Whelan
Jake Whelan

Security

/ 27 Nov, 2023

Firebase Authentication and Google Identity Platform User Enumeration Vulnerability

Firebase Authentication and Google Identity Platform are the two Google products that offer identity management.

Both products suffer from a vulnerability that allows an attacker to enumerate users on an application powered by Firebase Authentication or Google Identity Platform.

In this article, we’ll show how this vulnerability can be used and what the impact is.

Vincenzo Iozzo, Giovanni Gola
Vincenzo Iozzo, Giovanni Gola
Vincenzo Iozzo, Giovanni Gola

New Feature

/ 27 Oct, 2023

GDPR Compliance: Consent Management

Effortless GDPR compliance out of the box. Notify users about your intent to use cookies and request their consent.

Jake Whelan
Jake Whelan
1 2 3 4 5 6 7

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Documentation

We use cookies to improve your experience. Read our cookie policy.