Using React to Customize Your Auth0 User Experience
As our implementation with Auth0’s branding and styling grew more complex, our engineering team looked for a solution to simplify our implementation and accelerate o...
Insights and updates from the Basis Theory team
As our implementation with Auth0’s branding and styling grew more complex, our engineering team looked for a solution to simplify our implementation and accelerate o...
When we started designing Basis Theory's vault, we knew the platform encryption posture would need to change to meet new security, compliance, and customer requireme...
A data tokenization platform supports zero trust architecture practices without losing your ability to interact with and use the tokenized data. For example, Basis T...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
At Basis Theory, we find “building in public” and open-source to provide some of the best feedback loops for our product. It’s why we’ve opened and shared our Azure ...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Every engineer wants to ship high-quality software systems, but the “how” isn’t always straightforward. To help, we designed a testing series, “Shipping code quickly...
Read this overview for more information on how to manage your Basis Theory resources using Terraform.
Do you need to share a password to your Netflix Amazon, Hulu, or Disney+ account with household members or roommates but don’t want this sensitive information in the...
Ruby on Rails built its reputation on its ease of use and simplicity. As an engineer, I look for ways to remove the complexity of encrypting and securing data within...
In the event of a security breach, this data may result in a loss of sales, revenue, or reputation for the company. As a result, it becomes critical that an applicat...
Centralizing Operational Secrets Secrets are sensitive values, such as passwords, keys, and certificates, that must be shared across multiple systems—from applicatio...
Our task Let’s say we’re a food delivery app running a special promotion for two groups: anyone whose first name is Bob, or anyone whose favorite food is steak. Ulti...
Challenges with encrypting, securing, and maintaining sensitive data—like card numbers, social security numbers, API keys, and bank account numbers—tend to compound ...