Sandrino Di Mattia
@sandrinodm
Followers
1K
Following
13K
Media
73
Statuses
3K
Chief Product Architect @ Okta / Identity, Security, AI
Belgium
Joined September 2009
🚀 Just launched: https://t.co/00kH6pPJ6Z The ecosystem of agentic AI protocols and standards is expanding rapidly: MCP, A2A, AP2, XAA... Things are moving fast. This directory helps you keep up.
aistandards.directory
Discover the emerging protocols and standards which will define how we build and connect agentic AI workloads.
1
4
11
devs using @auth0 should be able to ask: "I want to create a mobile app with passkey and Google Sign-In, and access to an API with these scopes…" and we'd just set everything up for them with the new official @auth0 MCP server, you can 💪 @cursor_ai demo 📺👇, link in reply
14
29
345
Adding Authz to MCP can be this simple 🧵 fastify.register(fastifyAuth0API, { issuer: env.ISSUER, audience: env.AUDIENCE, }); That's what localden's #284 enables. Here is a prototype: https://t.co/XxoBSsSfXY. How does this work, What’s next? Read On ⬇️ (1/N)
3
3
16
✨ Agents can now act as MCP Clients ✨ New auth integrations for your MCP Server with Stytch, Auth0, and WorkOS ✨ Hibernation for McpAgent so you only pay when your agent is working ✨Durable Objects on FREE tier means you really have no excuse for not building agents now
Cloudflare delivers the toolkit for AI agents with new Agents SDK support for MCP (Model Context Protocol) clients, authentication/authorization/hibernation for MCP servers, and Durable Objects free tier. https://t.co/1rl1EugtsB
#DeveloperWeek
5
20
180
@tweetsbycolin 👋hey Colin. This is an important and nuanced topic. Let's dive in 👇 There’s different types of applications where refresh tokens are used: - Regular Web Applications (eg: PHP/Express/Next.js w/ App Router). These can access cookies server side and will mostly just need a
1
2
18
seems GoDaddy is now using @OpenFGA for authorization. proud to see such a company leverage an OSS project I created for such an important capability https://t.co/aKV8GTMzWt
godaddy.com
In this post we discuss GoDaddy's adoption of OAuth and OpenFGA for fine-grained authorization.
0
4
18
Vittorio Bertocci was a force to be reckoned with, leaving an indelible mark on the identity industry and capturing hearts along the way. Unforgettable. Remarkable. Impactful. 💙 https://t.co/LFrGwo41v5
auth0.com
Our friend and titan of the identity industry
10
100
390
Hey #dotnet friends, are you interested in writing some articles for Okta? We'd love to pay you🤑and everything. There are lots of topics to cover in this community and I need help doing it!
16
28
92
With the rise in remote work, Zero Trust security grew tremendously in the past year. That’s not changing anytime soon. Our State of Zero Trust Security report looks at how organizations around the world are approaching Zero Trust – check it out ⬇️ + ➡️
okta.com
It’s official: Zero Trust has gone mainstream. In just two years, adoption of this modern security framework has more than doubled, with 61% of organizatio...
1
4
17
Today we enter a new stage in our journey at Auth0 🚀 . The deal with Okta is closed! We declined several acquisition offers over the years, including a handful from Okta. So why did we say yes this time? Thread 🧵
7
54
396
I co-founded @auth0 with my brother-in-arms, @woloski. Today, we start a new chapter partnering with @ToddMckinnon and his team. Proud and excited to join forces with @Okta.
auth0.com
Identity leaders combine developer and enterprise expertise, offering customers more flexibility
9
44
419
We are launching the Auth0 CLI today! This was a project that came out of a hackauth0n ✪ in January and the team continued working on it on Fridays. They are launching it as experimental release to get feedback! https://t.co/UqaWchXmax Demos on the thread 👇🏻 🧵
1
16
58
We just released Auth0 Organizations! What is it? A new entity in the Auth0 model to allow teams (enterprises, partners, vendors, etc) to access your product, removing a lot of heavy lifting for developers. 🧵
2
6
37
We are very excited to share that we will be joining forces with @Okta. Learn more here. https://t.co/wv8Uva16AP
17
166
557
how it started how it's going
3
2
76
New blog post: JWT Bearer Authentication and Authorization for https://t.co/8Awf1ShEco Core 5 #aspnetcore #dotnetcore #jwt #auth0
https://t.co/MbyGdAeWTZ
sandrino.dev
An introduction on how to configure JWT Bearer authentication and authorization (based on scopes) for your ASP.NET Core 5 APIs.
0
3
2