sandrinodm Profile Banner
Sandrino Di Mattia Profile
Sandrino Di Mattia

@sandrinodm

Followers
1K
Following
13K
Media
73
Statuses
3K

Chief Product Architect @ Okta / Identity, Security, AI

Belgium
Joined September 2009
Don't wanna be here? Send us removal request.
@sandrinodm
Sandrino Di Mattia
3 months
🚀 Just launched: https://t.co/00kH6pPJ6Z The ecosystem of agentic AI protocols and standards is expanding rapidly: MCP, A2A, AP2, XAA... Things are moving fast. This directory helps you keep up.
Tweet card summary image
aistandards.directory
Discover the emerging protocols and standards which will define how we build and connect agentic AI workloads.
1
4
11
@yenkel
yenkel
8 months
devs using @auth0 should be able to ask: "I want to create a mobile app with passkey and Google Sign-In, and access to an API with these scopes…" and we'd just set everything up for them with the new official @auth0 MCP server, you can 💪 @cursor_ai demo 📺👇, link in reply
14
29
345
@ShrekOverflow
ShrekOverflow
8 months
Adding Authz to MCP can be this simple 🧵 fastify.register(fastifyAuth0API, { issuer: env.ISSUER, audience: env.AUDIENCE, }); That's what localden's #284 enables. Here is a prototype: https://t.co/XxoBSsSfXY. How does this work, What’s next? Read On ⬇️ (1/N)
3
3
16
@dinasaur_404
dina kozlov 🐀
8 months
✨ Agents can now act as MCP Clients ✨ New auth integrations for your MCP Server with Stytch, Auth0, and WorkOS ✨ Hibernation for McpAgent so you only pay when your agent is working ✨Durable Objects on FREE tier means you really have no excuse for not building agents now
@Cloudflare
Cloudflare
8 months
Cloudflare delivers the toolkit for AI agents with new Agents SDK support for MCP (Model Context Protocol) clients, authentication/authorization/hibernation for MCP servers, and Durable Objects free tier. https://t.co/1rl1EugtsB #DeveloperWeek
5
20
180
@yenkel
yenkel
1 year
@tweetsbycolin 👋hey Colin. This is an important and nuanced topic. Let's dive in 👇 There’s different types of applications where refresh tokens are used: - Regular Web Applications (eg: PHP/Express/Next.js w/ App Router). These can access cookies server side and will mostly just need a
1
2
18
@yenkel
yenkel
1 year
our free plan @auth0 just got a huge boost: - 25k MAUs - custom domains - passwordless logins and more... if you are starting an app, this is for you
26
37
344
@yenkel
yenkel
2 years
seems GoDaddy is now using @OpenFGA for authorization. proud to see such a company leverage an OSS project I created for such an important capability https://t.co/aKV8GTMzWt
Tweet card summary image
godaddy.com
In this post we discuss GoDaddy's adoption of OAuth and OpenFGA for fine-grained authorization.
0
4
18
@auth0
Auth0
2 years
Vittorio Bertocci was a force to be reckoned with, leaving an indelible mark on the identity industry and capturing hearts along the way. Unforgettable. Remarkable. Impactful. 💙 https://t.co/LFrGwo41v5
Tweet card summary image
auth0.com
Our friend and titan of the identity industry
10
100
390
@quorralyne
Heather Downing
4 years
Hey #dotnet friends, are you interested in writing some articles for Okta? We'd love to pay you🤑and everything. There are lots of topics to cover in this community and I need help doing it!
16
28
92
@woloski
Matias Woloski
4 years
Excited to announce something we've been working on this year with @Auth0Lab team: A Google Zanzibar-inspired service to solve fine-grained authorization at scale, for all your applications. Quick video walkthrough of the dashboard and 🧵
10
11
69
@okta
Okta
4 years
With the rise in remote work, Zero Trust security grew tremendously in the past year. That’s not changing anytime soon. Our State of Zero Trust Security report looks at how organizations around the world are approaching Zero Trust – check it out ⬇️ + ➡️
Tweet card summary image
okta.com
It’s official: Zero Trust has gone mainstream. In just two years, adoption of this modern security framework has more than doubled, with 61% of organizatio...
1
4
17
@woloski
Matias Woloski
5 years
Today we enter a new stage in our journey at Auth0 🚀 . The deal with Okta is closed! We declined several acquisition offers over the years, including a handful from Okta. So why did we say yes this time? Thread 🧵
7
54
396
@eugenio_pace
Eugenio Pace
5 years
I co-founded @auth0 with my brother-in-arms, @woloski. Today, we start a new chapter partnering with @ToddMckinnon and his team. Proud and excited to join forces with @Okta.
Tweet card summary image
auth0.com
Identity leaders combine developer and enterprise expertise, offering customers more flexibility
9
44
419
@woloski
Matias Woloski
5 years
We are launching the Auth0 CLI today! This was a project that came out of a hackauth0n ✪ in January and the team continued working on it on Fridays. They are launching it as experimental release to get feedback! https://t.co/UqaWchXmax Demos on the thread 👇🏻 🧵
1
16
58
@woloski
Matias Woloski
5 years
We just released Auth0 Organizations! What is it? A new entity in the Auth0 model to allow teams (enterprises, partners, vendors, etc) to access your product, removing a lot of heavy lifting for developers. 🧵
2
6
37
@eugenio_pace
Eugenio Pace
5 years
I am very excited to share that @okta signed a definitive agreement to acquire @auth0. I believe that Okta and Auth0 have an incredible opportunity to build the identity platform of the future *faster*, and make the internet more secure for everyone.
55
76
786
@auth0
Auth0
5 years
We are very excited to share that we will be joining forces with @Okta. Learn more here. https://t.co/wv8Uva16AP
17
166
557
@woloski
Matias Woloski
5 years
how it started how it's going
@auth0
Auth0
5 years
For our 8th birthday, we've arrived at the party in a brand new outfit ✨ https://t.co/rkhJMWCeJv
3
2
76