Everything you need to know to secure your MCP server using OAuth 2.1 and PKCE, server and auth metadata, client registration, JWT validation, and role-based access control.
By creating a central catalog of available servers, the MCP Registry has solved the discovery problem—but that's only half the equation. The real challenge lies in authentication.
42% of companies abandoned most AI initiatives in 2025, up from just 17% in 2024. After analyzing dozens of enterprise deployments, we found 4 patterns that separate winners from the graveyard of abandoned prototypes.
A practical guide to avoiding common pitfalls and implementing security best practices across both internal and third-party API integrations.
What if the most practical security guidance didn’t come from a startup, but from a government agency? Read how NIST’s peer-reviewed frameworks are powering real-world security.
OAuth 2.0 just got a major upgrade in how resources describe themselves. Find out what RFC 9728 introduces and why it matters.
From expired assertions to signature fails — a survival guide for anyone who's ever screamed at a SAML error message.
How to avoid common pitfalls and build resilient auth systems in on-prem and hybrid setups.
Misconfigured SAML metadata is one of the most overlooked causes of SSO failures. Learn how to spot hidden risks—and fix them before they break your login flow.
New this month: SSO Role Mapping, Schema-Based Policies, On-Prem Guides, and more
Mastra is a TypeScript framework for agentic apps. In this post, we'll use it to build an agentic app that can fetch data from GitHub in less than 5 minutes.
oRPC (OpenAPI Remote Procedure Call) combines the familiarity of RPC with the industry-standard OpenAPI spec so that every request/response is fully typed from client to server. 
A deep dive on how pooled connections work in the Elixir DBConnection library.
How to utilize delta conflict-free replicated data types for managing distributed cache or configuration state on an Elixir cluster.
Session management is hard. Refresh tokens make it easier—and safer. This guide breaks down how they work, why you need them, and how to avoid common mistakes (with code included).
IBM Research’s Agent Communication Protocol (ACP) provides autonomous agents with a common “wire format” for talking to each other. But how does it differ from MCP and A2A?
A deep dive into the messy world of SAML signature verification bugs — complete with real examples, cautionary tales, and practical tips to keep your app out of trouble.
Think of MCP as “plug this model into my data” and A2A as “now let several specialised models talk to each other.”
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.