We deep dive into the challenges in the identity space and how they impact our apps and systems using examples from 5 open source tools that cover the most common risks and stacks in use today. We will also share real tips and best practices for how to mitigate these risks and reduce attack surface.