Allow users to sign in via CLIs and on TVs and other non-traditional devices
New this month: Custom CSS for AuthKit, WorkOS Feature Flags, CLI Auth, & more
Connect AuthKit to the tools you already use.
Radix and shadcn-ui are both component libraries for React, but which should you choose?
If you think you’re done when you authenticate a user, think again. Proper session management can make or break your app, both security and UX-wise. We gathered some industry best practices to help you get started.
Authorization rules can be expressed as policies, relationships, or both. Read how each one works, their pros and cons, and find the best for your case.
Keeping your data safe by encrypting them is crucial, but how do you keep the encryption keys safe? Read what EKM and KMS are and how they work together to do exactly that.
AI agent frameworks and platforms empower developers to build software that can reason, remember, and act independently. Which should you choose?
Learn how to use OAuth for secure machine-to-machine communication with the Client Credentials flow.
Large Language Models (LLMs) excel at producing text, but many applications need them to do more: raise GitHub issues, star a repository, or send Twilio messages in real time.
Ensure the right people have the right access. Check out our RBAC best practices guide and avoid common pitfalls.
Step-by-step tutorial that walks you through the necessary steps to add role-based access control (RBAC) to your app using WorkOS and Node.
Bots are everywhere. How can you distinguish the bad from the good, and how can you stop them? Read our guide for practical steps on how to stop bots and protect your app.
When your goal is selling to enterprises, sooner or later, you will have to leave RBAC for a fine-grained authorization model. Read more about why that is and how you can make the move.
Learn what federated identity is, how it works, its pros and cons, and how it differs from SSO and social logins.
Custom Logout URIs, Session Inactivity Timeouts, and AuthKit Next.js SDK v1.0
Do you plan on outsourcing SCIM and you don't know where? Read this article for a list of auth providers that support SCIM and a comparison of the features they offer.
Do you want to add passwordless authentication to your app and don’t know where to start? Read our guide for an overview of the top available methods, their pros and cons, and which one might be the best for you.
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.