What does federated mean? Federation refers to group of entities that are independent yet united under a central organization. Learn how that meaning applies to search, identity, and databases.
Twilio built a business model that started with individual developers and expanded into massive enterprise sales. Learn how they did it––and how you can too.
RBAC and ABAC are the two most common access control models for system authorization. Understanding the differences between the two is key for choosing between RBAC vs. ABAC for your system.
If you build it, they won't come. As a founder, it's your job to make the sales that fuel your company's growth––and that includes enterprise sales. Read this guide so you can land the big deals.
So, you're writing your first service level agreement? Learn from the best: examples from Slack, Amazon, and Google show how you can write your SLA for comprehension and effectiveness.
User provisioning and user deprovisioning is how you can enable system access to new employees and restrict access to departing employees. Learn how this can make you more efficient and secure.
A guide to magic links: the how they work and why you should use them. We’ll take a deep dive into how magic links work from a technical, security, and UX perspective.
GDRP affects companies the world over and as a developer, it's your job to ensure compliance. Read our guide to the basics to understand what GDPR entails.
Last month, we held our WorkOS Fall Release! We debuted new features, gave product updates, launched our new docs site, and hosted a fireside chat with the CTO of Webflow.
The WorkOS style guide for technical content. Our descriptive guide to writing blogs, tutorials, and technical documentation for developers by a developer.
Learn how Webflow, a responsive web design tool used by Zendesk, Dell and Hellosign, saved over 3 months of engineering time by integrating SSO using WorkOS.
We put together this list of the top SSO providers for 2020: to help you find the SSO provider that meets your needs now and can grow with you as your company scales.
In this article, we’ll cover a baseline of authentication protocols: PAP, CHAP, and EAP. We’ll cover what the protocol is, give a detailed example, and talk through some of the weaknesses.
Callingly is a sales enablement platform that integrates into customer’s CRM systems. Learn how they saved 120 developer hours by integrating SSO with WorkOS instead of building in-house.
This post will walk through the basics of how to send out webhooks from your app, manage authentication, handle security, and provide a smooth developer experience to your customers.
Last month, we held our first public event: the WorkOS Summer Release! Putting together a fully remote event as a fully remote team involved a lot of prep work.
Authentication and authorization are often interwined, but refer to completely different things. This post breaks down the difference and explores difference schemes for each.
Cerkl is a cross-channel internal communications solution that serves over 2 million active users a month. Learn how Cerkl integrated WorkOS SSO in two days and unblocked enterprise deals.
If you’ve been put in charge of writing a security policy document, you might feel a tad overwhelmed. This guide will help, with examples from companies like Slack and Stripe.
The history of digital authentication spans just 60 years, but things have progressed (really) quickly. This guide walks through the basics and where things might be going.
SOC 2 compliance will help your company grow and land larger deals, but it takes some work to get there. This guide will walk through what you need to know as a developer.
For intrepid developers planning on homebrewing enterprise SAML SSO, here's a guide covering common SAML security vulnerabilities, footguns, and countermeasures.
EnjoyHQ is a UX research repository for product and design teams, supporting companies of all sizes. Learn how EnjoyHQ utilized WorkOS to implement enterprise level SSO in less than 4 hours.
How Dropbox built enterprise ready features like admin controls and integrations that let them close bigger, more impactful deals, move upmarket, and stay competitive.
This post explores UI/UX best practices for Identity Provider (IdP) and Service Provider (SP) initiated SSO flows, like subdomaining tenants and separating email and password screens.
Our guide will walk you through the audit log basics that every developer should know: why audit logs are important, event formats, SIEM tools, retention best practices, and more.
Our guide will walk you through everything Directory Sync: what it is, why you should care, protocols like SCIM, Directory Sync vs JIT, and how to build it into your product.
Adding SSO to your app is a common requirement for selling to enterprise customers. Here’s a guide that will help you understand SSO and choose the best way to add it to your app.
Incorporating enterprise features unlocked big deals for Slack. This post looks at how features like SAML SSO, EKM, and audit logs help Slack close those enterprise deals.