September 19, 2023
Part 1 in a series of how we were able to cut down our AWS infrastructure costs by more than 50%
September 04, 2023
In workforce identity and B2B flows, LDAP is main protocol used to interact with directory services that store user identity and device information. In this blog post we take a look at LDAP and how it works.
September 01, 2023
In this blog we will go over the http protocol error codes 401 and 403 and describe when is it appropriate to use each of them.
August 16, 2023
In this blog we break down the differences between URL, URI, and URN
August 12, 2023
What is the Business Source License and why did HashiCorp adopt it?
August 08, 2023
JWKS are an important part of the authentication process. In this article we go over what they are and how they are used
August 02, 2023
Authentication and Authorization represent two fundamentally different aspects of security that work together in order to protect sensitive information. In this blog, we will go over some of the key differences between the two.
July 25, 2023
SAML and OAuth are protocols often used in the authentication but what are the differences between them and which one do you choose?
July 12, 2023
User Migration can be a challenging process, in this article we go over some user migration scenarios and break down the lazy migration strategy
June 23, 2023
Learn how we built a Q&A bot that is an expert at SuperTokens powered by ChatGPT
June 08, 2023
Comparing the three leading open-source authentication providers - Ory, Keycloak and SuperTokens
April 17, 2023
We break down the OIDC and OAuth standards and explain the key differences between the two
April 17, 2023
A guide into single sign-on implementation and how to perform sso testing for authentication and login
March 16, 2023
A #buildinpublic piece on why we designed the SuperTokens homepage
March 06, 2023
This tutorial wil guide you on how you can setup a bootstrap login template in Django
February 24, 2023
Email verification can increase friction and adds another stop to onboarding, but when done correctly can lead to better security and establish better communication with users.
February 23, 2023
Passwordless is one of the most popular authentication methods
February 03, 2023
By self-hosting auth users gain finer control over their data.To shed some light on the matter, let’s compare several authentication providers which offer self-hosting functionality
January 16, 2023
A guide on creating great authentication experiences with custom UI
January 12, 2023
Poor app performance can reduce user engagement and will negatively affect SEO, here are 5 tips to optimize your react app
January 11, 2023
A comparison of the pre-built UIs from current authentication providers and how to customize them
January 09, 2023
2022 had been an amazing year for SuperTokens, here are some of the top highlights
November 15, 2022
An in depth guide covering Auth0's pricing model
November 15, 2022
An in depth guide covering AWS Cognito's pricing model
November 15, 2022
An in depth guide covering Okta's pricing model
October 27, 2022
With user roles, you can now use SuperTokens to easily attach a different set of permissions to each user.
October 27, 2022
Cross-Origin Resource Sharing (CORS) is a mechanism that supports secure requests and data transfers from outside origins (domain, scheme, or port).
October 20, 2022
Learn about RBAC and advantages + disadvantages compared to ABAC.
September 12, 2022
When building an app with Supabase you will have to choose an authentication solution. Here are some reasons why you should choose SuperTokens as you auth provider and why it pairs so well with Supabase
August 17, 2022
Learn how to integrate supertokens-web-js SDK into your VueJS application.
July 26, 2022
A quick overview of different types of passwordless authentication methods to improve user retention
July 13, 2022
A step by step guide on how to integrate SuperTokens' pre built UI in a VueJS app
May 09, 2022
An in depth review of Auth0 alternatives for 2023: Auth0 vs Okta vs Cognito vs SuperTokens
April 24, 2022
Learn how to connect a self-hosted SuperTokens core to a database with or without Docker
April 14, 2022
This tutorial wil guide you on how to add SuperTokens to a React and Express app deployed on Vercel
March 24, 2022
Learn about JWTs, their pros & cons, and how they work.
March 23, 2022
Learn about the difference between JWT Token and OAuth
March 14, 2022
Build an elegant login screen super fast using React and Bootstrap
March 02, 2022
A guide on password hashing and salting in different languages and why it's important to do so
February 10, 2022
Learn how to maintain a JWT token blacklist / deny list using an in-memory data cache
February 09, 2022
In this blog, we'll walk you through setting up an email-password authentication with popular social providers like Google, GitHub, and Apple using SuperTokens on a ReactJS application with ExpressJS as the backend.
January 26, 2022
This blog walks you through integrating your frontend with social login APIs provided by SuperTokens.
December 13, 2021
Any auth solution must provide the ability to customise their APIs. In this blog we discuss how to customise the auth APIs provided by SuperTokens using its “Override” feature
November 11, 2021
This blog covers an analysis of why redux state is immutable and how you should go about modifying state in your Redux applications
November 10, 2021
What is vendor lock-in? How does it affect your customers? What are the different ways you can minimize it? Read the blog to learn more.
June 01, 2021
What should happen on the backend when a user forgets their password? Read to find a pseudo code implementation of the simplest way to reset passwords securely.
March 05, 2021
Why did Okta spend $6.5B on Auth0? What does this mean for app developers? See reactions from customers and employees
December 10, 2020
Writing JSX to build pixel perfect UI elements can be very time consuming and frustrating. Learn how react engineers can inject complex elements / React components into a Webflow generated HTML page.
July 30, 2020
Session hijacking is one of the oldest, yet unsolved, attack vectors to gain unauthorised access to a user’s account. This discussion is regarding a method called "rotating refresh tokens" to better detect token theft.
June 23, 2020
Learn about the best approach and common misconceptions of storing sessions in cookies or browser storage
June 11, 2020
This article will be comparing SuperTokens to Node’s most popular session management library– express-session. Learn more about the comparison based on different security and performance metrics.
May 06, 2020
Being Node’s most popular session management library, express-session has its set of flaws– especially when it comes to security. This article will help you analyse the good and bad parts of it.
April 24, 2020
A lot of developers confuse OAuth with web session management and hence end up using the wrong protocol. This article will clarify when to use what solution.
March 18, 2020
JWTs were originally designed for use in OAuth. This article covers the pros and cons of using JWT and talks about a solution which has the advantages of JWTs without any of its disadvantages.
June 08, 2019
This blog covers an analysis of a new open source session flow that is secure and easy to integrate. Learn more about the customizable library and its implementation details.
June 07, 2019
This article covers extensive conversations with over 70+ developers exploring different session management practices, identifying issues and converging on a solution to these issues.