Use AI coding agents and WorkOS Skills to generate production-ready flows in your framework, language, and design system.
Grant agents time-limited access to OAuth connections using Pipes and MCP.
Develop with WorkOS entirely from your terminal, with agent-ready tooling built in.
Dialpad CTO Brian Peterson on mandating AI in engineering, the Jevons Paradox in practice, and why customer service will transform within a year.
Honeycomb CEO Christine Yen on why observability matters more than ever as AI agents reshape how software gets built, debugged, and understood.
Automation Anywhere CPO Peter White on why enterprises want solutions over technology pitches, where AI agents actually deliver, and the reality behind the hype.
Daytona CEO Ivan Burazin explains why every AI agent needs its own computer, how he built an AI with its own identity, and why SaaS is shifting from seats to consumption.
Assembled CEO John Wang explains why AI is growing support teams, not shrinking them, and why orchestration is the real differentiator in customer support.
Cosmo Wolfe explains why AI companies are rethinking pricing, why per-seat models are dying, and what Stripe's Machine Payment Protocol means for agents as buyers.
Augment Code CEO Matt McClernan discusses the rapid shift from AI code completions to agent orchestration at HumanX 2026, interviewed by WorkOS CEO Michael Grinich.
Noam Schwartz of Alice explains why prompt injection is the new SQL injection and what enterprises deploying AI agents need to know about trust and safety.
Three mechanisms guard three different checkpoints in OAuth and OpenID Connect. Here is why none of them is optional.
Why teams outgrow Amazon Cognito and which authentication platforms handle enterprise SSO, multi-tenancy, and directory sync without the glue code.
Slack, Notion, and Linear each take a different approach to per-tenant roles and permissions. Here are the patterns worth stealing for your own app.
Master secure authentication in Node.js from Passport.js and JWTs to enterprise SSO, with production-ready patterns and security best practices.
How attackers turn legitimate consent prompts into persistent backdoors, and what your team can do about it.
A deep dive into the FIDO2/WebAuthn protocol mechanics that tie every passkey to a specific domain, making credential theft physically impossible at the cryptographic layer.
What to use when your B2B auth needs outpace PropelAuth.
Please try a different search
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.