OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Configurable logging for REST and GraphQL requests Inline duplicate-name handling for customer creation (scoped error under the form with input focus) Availability ...