I bought a canned IoT device with Debian image - it had integrated code for oauth <> github integration...but it didn't work. I'm not a developer, so I didnt know where to start. There's a quick start guide that tells you where to go, what changes to make...and they provide a back-end test harness to validate oauth.io <> github integration success...as well as a front end code sample to validate from your client. Could not have been easier! I did have to contact support as I'm a newbie, but they were spot on with help and configuration advice. Much appreciated! Review collected by and hosted on G2.com.
I bought a canned IoT device with Debian image - it had integrated code for oauth <> github integration...but it didn't work. I'm not a developer, so I didnt know where to start. There's a quick start guide that tells you where to go, what changes to make...and they provide a back-end test harness to validate oauth.io <> github integration success...as well as a front end code sample to validate from your client. Could not have been easier! I did have to contact support as I'm a newbie, but they were spot on with help and configuration advice. Much appreciated! Review collected by and hosted on G2.com.
It is quite an easy tool to use and implement with our website. It is a great authentication tool as it has great security features that made us settle for it not to forget that it's pricing is also quite fair considering the features that it offers. With OAuth.io, we were able to create custom log ins for our staff to limit just how much of access they have and for us to know just who has access to what.This was very helpful Review collected by and hosted on G2.com.
We have not yet experienced any challenge with this software. It has been pretty great so far. Review collected by and hosted on G2.com.
It's so easy to integrate and use, it's also very fast (the sign in flow). I would prefer this over Auth0 anytime. Review collected by and hosted on G2.com.
It had some outdated dependencies, but those were easily fixed and not a very large problem. Review collected by and hosted on G2.com.
The users and their passwords are safe in another server of the application, if some hacker is manipulated by the information, especially because each website or application has a couple of different tokens for each user Review collected by and hosted on G2.com.
Unquestionably the great disadvantage of this security application is that some applications that are accessed with Facebook or Twitter post in the user's profile Review collected by and hosted on G2.com.