Our Product offering
Expansive and modular user management suite
![landing image](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Flanding-image.f338c8d5.png&w=828&q=100)
Authentication
A complete solution for all your Authentication needs
- Passwordless
- Email Password
- Social Sign in
- B2B Auth and multi-tenancy
- Multi-factor authentication (MFA)
![Passwordless form](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fpasswordless.e35b0e86.png&w=750&q=75)
Extensibility
Override SuperTokens to make it work the way you want
Customize any part of the prebuilt UI so that you do not have to implement custom login forms from scratch
![Dunder muffin login form with overrides example code snippet for tablet](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdunder-muffin-tab.976d3f9b.png&w=1200&q=75)
![Dunder muffin login form with overrides example code snippet for web](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdunder-muffin-web.fdf0b143.png&w=2048&q=75)
![Backend Apis code example.](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fbackend-apis.56ef83cd.png&w=1920&q=75)
Add pre or post API logic to any auth route (eg: Sign up API).
Change the request (body, headers, URL) sent to your server, handle user events, and control user redirects.
![Backend Apis code example.](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Ffrontend-hooks.4f3936a9.png&w=1920&q=75)
![Invite flow](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Finvite-flow.d4bc4366.png&w=1080&q=75)
Implement an invite flow.
![Deduplication](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdeduplication.3721e20e.png&w=1080&q=75)
Implement account deduplication.
![API Callbacks](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fapi-callbacks.f5832a11.png&w=1080&q=75)
Adding post API callbacks.
![Disabling Signup](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdisable-signup.41c58e99.png&w=1080&q=75)
Fully deactivating the user registration process.
![Online/Offline switch](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fonline-offline-switch.7c329fa8.png&w=1080&q=75)
Updating the online / offline status of a user post successful session verification.
Reliability and Security
![database](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdatabase.c107b898.png&w=256&q=75)
Run end to end tests locally or in a CICD pipeline by using our core with an in memory DB.
![code](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fcode.525f44e8.png&w=256&q=75)
Easily write unit tests by mocking auth APIs via our backend SDK.
![servers](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fhorizontally-scalable.7c9047ce.png&w=1080&q=75)
SuperTokens is stateless and horizontally scalable to 10s of millions of MAUs.
![AICPA SOC](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fsoc2.d02fccae.png&w=1080&q=75)
100+ controls and tests.
![Session theft architecture.](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fsession-theft.c65cdbaa.png&w=1080&q=75)
We use rotating refresh tokens to detect session theft reliably.
User Management
View and manage all your users. Reset passwords, send email verification links, revoke sessions, modify user roles, view session metadata and more.
![Dashboard](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fdashboard.1f284a98.png&w=1920&q=75)
Migration
Easily migrate large user bases
Get started!
Quick Start guides for all use cases!
![Guides page.](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fguides-page.13354f3d.png&w=1920&q=75)