The Developer’s Guide to Single Sign-On (SSO)

Single Sign-On sounds simple…until you're deep in SAML configs and OIDC flows.

This practical guide from Auth0 walks you through what actually works, where to start, and how to make the right architecture calls.

Download it to learn:

  • How SSO actually works (without the buzzwords)
  • Which protocols matter: SAML, OIDC, WS-Fed, LDAP
  • Where to start and how to integrate with Auth0
  • Whether to build, buy, or blend—and how not to regret the decision
View Now

OAuth 2.0 and OpenID Connect: The Professional Guide

In the world of digital identity, every detail matters. OAuth 2.0 and OpenID Connect are the foundational protocols for securing modern applications, but their complexity can be overwhelming. This professional guide goes beyond the surface, explaining not just the "how," but the "why" behind every implementation choice.

What You Will Learn:

  • The Evolution of Identity
  • Token Deep Dive
  • Practical Scenarios
  • Common Anti-Patterns
View Now

Auth0 and AWS: Building secure, scalable GenAI and SaaS apps

You've built a successful app and now you're ready to grow. But scaling for enterprise clients comes with a new set of challenges, including security, compliance, and user experience. Businesses want a solution that's secure, reliable, and easy to use, and many are turning to customer identity to build that trust.

Explore how the combined power of Auth0 and AWS helps you build enterprise-ready apps that:

  • Secure access at scale
  • Meet compliance requirements
  • Deliver frictionless user experiences
View Now

Customer Identity Trends Report 2025: Securing Customer Trust in The Age of AI

Uncover how trust influences customer journeys, the threats poised to erode it, and where consumers stand on a new frontier for trust — AI agents.

  • Find out what consumers really think about AI agents
  • Discover which industries are seeing the most identity-based attacks
  • Read about the latest customer identity threats faced worldwide
  • Gain insights into consumer attitudes around identity and authentication
View Now

MSP customer onboarding checklist

Onboarding new clients is a critical phase for managed service providers (MSPs). It sets the tone for the partnership and directly impacts your revenue timeline. Traditionally, this process can be time-consuming and prone to errors, but with a standardized approach, you can transform it into a swift, efficient, and profitable experience.

A new checklist from Nerdio provides a 10-step guide to standardize your customer onboarding process. It includes insights into how Nerdio Manager for MSP can automate each phase, helping to reduce onboarding time by up to 50%. The checklist covers key steps such as:

  • Pre-onboarding assessment: Understanding the client's current environment and setting clear expectations.
  • Tenant access & security setup: Establishing secure access and baseline security configurations.
  • Provision Azure infrastructure: Setting up the foundational Azure resources required for the client's operations.
  • Deploy policies: Ensuring all devices and users adhere to organizational policies.
  • Configure billing and reporting: Establishing transparent billing processes and maintaining comprehensive documentation.

This guide is designed to help you stop losing time and start gaining revenue by streamlining your process and eliminating manual effort.

Ready to get started?

View Now

CIS Level 1 Intune policies for Windows 11

The CIS (Center for Internet Security) Level 1 Baseline for Windows 11 is a robust security standard that helps to reduce the attack surface and standardize controls for enterprise and SMB fleets. Nerdio has partnered with CIS to deliver these CIS-hardened policies, developed directly by their security experts. When implemented through Microsoft Intune, these settings provide a consistent, auditable way to enforce best practices across thousands of endpoints.

To help you get started, Nerdio has created a full breakdown and guide to CIS Level 1 Intune policies for Windows 11 (3.0.1). This guide includes:

  • In-depth summaries of each policy, including purpose, highlights, and key settings
  • Practical deployment notes to guide you through implementation
  • Expected impact for end-users and help desks
  • A full reference table for quick look-up

This resource is designed to be your blueprint for a secure, supportable, and well-documented Windows security posture.

Ready to simplify your security?

View Now

Checklist: 9 ways MSPs can reduce costs

Are you feeling the squeeze of shrinking margins and growing customer expectations? It's a common challenge for managed service providers (MSPs). The key is to work smarter, not harder.

This new checklist from Nerdio is designed to help you do just that. It provides a practical self-assessment to help you identify where your business might be losing time, money, or opportunity across IT operations. This quick self-assessment covers high-impact categories based on MSP best practices and real-world data. Key areas include:

  • Licensing & software: Do you know how many licenses for commercial software you actually use versus how many you pay for?
  • Cloud optimization: Are you using auto-scaling to avoid overprovisioning during off-peak hours?
  • User onboarding: Can you onboard a new user in under 10 minutes with minimal manual steps?
  • Multi-tenant efficiency: Can you manage all clients from a single interface?
  • Talent & scalability: Are engineers focused on strategic work instead of repetitive tasks?

A high number of "No" or "Unsure" responses may reveal where automation or better tooling can unlock cost savings, improve consistency, and free your team to focus on high-value work.

Ready to find out where you can improve?

View Now

Does Your DEM Strategy Connect All the Dots?

Comprehensive DEM

Imagine a world where digital experiences are always on, performing flawlessly and able to handle any business situation. That world is in reach with a more comprehensive DEM that’s able to capture and integrate critical data from across your tech stack, identify where and why issues are happening, and help you fix them before they impact the relationships you’ve worked so hard to build with your users.

View Now

AI-Powered DEM: Bring Greater Intelligence to Every Digital Experience

Propel your business forward with AI-powered DEM

The most successful businesses are using AI-powered digital experience monitoring (DEM) capabilities to revolutionize how they manage their digital ecosystems. This leads to improved customer experiences from: Faster onboarding, efficient incident management, continuous optimization and everything in between.

View Now

AI Unwrapped 2025 Impact Report

Shipping code is only half the battle.

Without robust observability (the comprehensive logs, metrics, and traces that reveal precisely how systems are behaving in real-time), even the most brilliant applications become opaque, unreliable black boxes at scale. As artificial intelligence moves from speculative promise to foundational technology, we’re seeing the same critical lesson emerge.

View Now

How BytePlus ModelArk and ByteDance Seed Are Powering Creativity & Commerce

This e-book explores how BytePlus ModelArk and Seed models combine enterprise-grade infrastructure with advanced AI capabilities to accelerate content creation, empowering businesses to deliver high-quality text, images, and videos at scale for today’s fast-paced creative and commercial demands.

  • Content Suite in Days, Not Weeks
  • Studio-Quality Visuals & Video in Seconds
  • Enterprise-Grade AI Built for APAC & Global Scale
View Now

Beyond the Cloud: Building a Secure & Scalable AI Ecosystem

As enterprises move beyond pilot AI projects and isolated use cases, the need for a secure, scalable, and cost-effective AI ecosystem has never been more critical. This e-book serves as a practical guide for IT leaders and decision-makers seeking to operationalize AI at scale.

  • Understand how ungoverned AI usage can compromise compliance and data integrity, and what enterprises can do to mitigate these risks.
  • Learn how to choose the right models for the job, from deep-thinking LLMs for analytics to lightweight AI for real-time responsiveness.
  • Explore strategies like model quantization, elastic scaling, and infrastructure optimization to reduce costs while maintaining enterprise-grade performance.
View Now

The Developer’s Guide to Single Sign-On (SSO)

Single Sign-On sounds simple…until you're deep in SAML configs and OIDC flows.

This practical guide from Auth0 walks you through what actually works, where to start, and how to make the right architecture calls.

Download it to learn:

  • How SSO actually works (without the buzzwords)
  • Which protocols matter: SAML, OIDC, WS-Fed, LDAP
  • Where to start and how to integrate with Auth0
  • Whether to build, buy, or blend—and how not to regret the decision
View Now

OAuth 2.0 and OpenID Connect: The Professional Guide

In the world of digital identity, every detail matters. OAuth 2.0 and OpenID Connect are the foundational protocols for securing modern applications, but their complexity can be overwhelming. This professional guide goes beyond the surface, explaining not just the "how," but the "why" behind every implementation choice.

What You Will Learn:

  • The Evolution of Identity
  • Token Deep Dive
  • Practical Scenarios
  • Common Anti-Patterns
View Now

Auth0 and AWS: Building secure, scalable GenAI and SaaS apps

You've built a successful app and now you're ready to grow. But scaling for enterprise clients comes with a new set of challenges, including security, compliance, and user experience. Businesses want a solution that's secure, reliable, and easy to use, and many are turning to customer identity to build that trust.

Explore how the combined power of Auth0 and AWS helps you build enterprise-ready apps that:

  • Secure access at scale
  • Meet compliance requirements
  • Deliver frictionless user experiences
View Now