Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: Add "IAM Tools" #319

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

lukiccd
Copy link
Contributor

@lukiccd lukiccd commented Dec 11, 2024

Related Issue

Link to the Github Issue created for this blog post

Link to Google Doc

TODO

Checklist

  • Has cover image been added
  • Have all content images been added. Do they render correctly? (aspect ratio etc)
  • The code inside code blocks gives no errors
  • Check for SEO keyword?
  • Added call to action to link to supertokens and to link to other blogs.
  • Add reference to how SuperTokens solves this blog's problem (if relevant).

Remaining TODOs

  • ...

Copy link

netlify bot commented Dec 11, 2024

Deploy Preview for gracious-clarke-e6b312 ready!

Name Link
🔨 Latest commit 79ebb0a
🔍 Latest deploy log https://app.netlify.com/sites/gracious-clarke-e6b312/deploys/6798150e4b08af0008ed4146
😎 Deploy Preview https://deploy-preview-319--gracious-clarke-e6b312.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Comment on lines +4 to +5
description: "Identity and Access Management (IAM) tools have become a cornerstone for businesses to securely manage user access across multiple systems and applications. With the growing threat landscape and increasingly complex compliance requirements, choosing the right IAM solution can significantly improve security, optimize user experiences, and simplify the lifecycle of identity management.
."
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description: "Identity and Access Management (IAM) tools have become a cornerstone for businesses to securely manage user access across multiple systems and applications. With the growing threat landscape and increasingly complex compliance requirements, choosing the right IAM solution can significantly improve security, optimize user experiences, and simplify the lifecycle of identity management.
."
description: "Identity and Access Management (IAM) tools have become a cornerstone for businesses to securely manage user access across multiple systems and applications. With the growing threat landscape and increasingly complex compliance requirements, choosing the right IAM solution can significantly improve security, optimize user experiences, and simplify the lifecycle of identity management."


This article explores the eight best identity and access management tools—ranging from open-source frameworks to full-featured enterprise platforms. We’ll also discuss how to choose a suitable IAM tool for your organization, the benefits of implementing IAM solutions, and why [SuperTokens](https://supertokens.com/product) stands out as a compelling option for companies of all sizes.

---
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
---

cover: "iam-tools.png"
category: "iam, authentication, security"
author: "Dejan Lukic"
---
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
---

category: "iam, authentication, security"
author: "Dejan Lukic"
---
Identity and Access Management (IAM) tools have become a cornerstone for businesses to securely manage user access across multiple systems and applications. With the growing threat landscape and increasingly complex compliance requirements, choosing the right IAM solution can significantly improve security, optimize user experiences, and simplify the lifecycle of identity management.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add h2 tag with Introduction


---

### 1. SuperTokens
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why does this start with h3?

**Customer Ratings:**
While relatively newer compared to legacy players, SuperTokens is gaining traction in developer communities, often praised for its ease of integration, flexibility, and responsive open-source support channels.

**Pricing:**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add link to pricing

**Customer Ratings:**
Auth0 consistently receives high marks on platforms like G2 and Gartner Peer Insights for usability, scalability, and integration flexibility.

**Pricing:**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

pricing link, link to our pricing comparison blogs

**Customer Ratings:**
Highly rated by analysts such as Gartner, Okta is considered a market leader in the IAM space, praised for reliability and breadth of functionality.

**Pricing:**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

link to our pricing comparison blogs


### 3. Okta

**Overview:**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove all occurrences of this, not required and the formatting looks weird

### 4. Keycloak

**Overview:**
Keycloak is a popular open-source IAM solution that provides SSO, identity brokering, and user federation. Backed by Red Hat, Keycloak appeals to developers who prefer full customization and control over their IAM deployments.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add links to our other keycloak comparison posts, do the same for the other providers if they exist

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants