A detailed glimpse at Project Horizon: an internal code factory at WorkOS.
Grant agents time-limited access to OAuth connections using Pipes and MCP.
Develop with WorkOS entirely from your terminal, with agent-ready tooling built in.
How the Identity Assertion Authorization Grant (ID-JAG)—marketed by Okta as Cross-App Access (XAA)—lets enterprises manage MCP AI app connections through their IdP, with centralized visibility, policy control, and no consent fatigue.
The Linux Foundation unites MCP, goose, and AGENTS.md under open governance. WorkOS breaks down what the new Agentic AI Foundation (AAIF) means for developers.
A practical guide to OAuth’s original MCP onboarding method: how DCR works, where it breaks at scale, and why it still matters alongside CIMD.
Scalable, stateless client registration for AI agents: using a URL as your OAuth client ID to access MCP servers.
OAuth 2.0 and OIDC are no longer just for SSO or integrations; they’re the trust layer that makes AI agents safe, scoped, and governable.
Strengthened SSO Security with Sign-in Consent, CIMD Support for MCP Auth, AuthKit SDK for TanStack Start, & more
AWS’s new “open training” approach could fundamentally reshape who gets to build frontier-grade AI models—and what they can do with their proprietary data.
What MCP Tasks are, why they matter, and the full technical guide to implementing them.
A practical, end-to-end deep dive into data isolation, tenant-aware auth, scaling, and compliance for B2B SaaS.
A technical guide to MCP client registration: Dynamic Client Registration (DCR) vs Client ID Metadata Documents (CIMD).
How modern apps get access to your data without your password.
WorkOS FGA introduces a new approach to SaaS authorization that extends familiar RBAC into a flexible, hierarchical model designed for real product evolution. Learn why traditional RBAC and schema-driven FGA systems break down as applications grow, how WorkOS’ resource-scoped model avoids rewrites and role explosion, and how it supports enterprise identity mapping, high-cardinality architectures, and emerging AI agent workflows.
Keep tenants isolated, roles sane, and your auth layer out of incident reviews.
The checklist that makes authorization boring, predictable, and surprisingly hard to break.
Year two starts with fewer hacks and more infrastructure.
Please try a different search
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.