Everything you need to know to secure your MCP server using OAuth 2.1 and PKCE, server and auth metadata, client registration, JWT validation, and role-based access control.
Learn how to leverage Model Context Protocol’s six core features to build secure and scalable AI applications.
42% of companies abandoned most AI initiatives in 2025, up from just 17% in 2024. After analyzing dozens of enterprise deployments, we found 4 patterns that separate winners from the graveyard of abandoned prototypes.
Your support ticketing system contains sensitive data from multiple organizations and customers. How do you ensure users only see tickets they're authorized to view?
Step-by-step tutorial that walks you through the necessary steps to add SSO to your app using SAML, Okta, Go, and WorkOS.
Step-by-step tutorial that walks you through the necessary steps to add Log in with Google to your app using Go and WorkOS.
Picture this: you've built a powerful authorization system based on Google's Zanzibar design, capable of handling complex permission relationships at scale. Now you want to let developers try it out. How can you let them experiment freely without spinning up countless backend environments?
A critical vulnerability in Microsoft's multi-factor authentication (MFA) system has been discovered by Oasis Security's research team, allowing attackers to bypass time-based one-time passwords (TOTPs) through brute force methods.
Step-by-step tutorial that walks you through the necessary steps to add SSO to your app using SAML, Entra ID (Azure AD), Node, and WorkOS.
Step-by-step tutorial that walks you through the necessary steps to add Log in with GitHub to your app using Go and WorkOS.
Organization roles, custom OAuth scopes, accept invitation API, AuthKit role assignment via SSO
Step-by-step tutorial that walks you through the necessary steps to add SSO to your app using SAML, Okta, Node, and WorkOS.
An often overlooked but important component of identity management is customer onboarding.
Launch Week recap (FGA, Radar, Passkeys, Widgets, Actions, Entitlements, Next.js Starter Kit) and more
Compare WorkOS, Auth0, and Stytch to learn what each does, its features, and which one you should use.
Learn what makes Google Zanzibar the best authorization solution and how WorkOS FGA builds on top of these features.
Learn about the failed authentication events you can get from WorkOS and how you can use them to implement features in your app.
In this tutorial, paired with companion code, you’ll learn to build a secure, scalable document access control system using WorkOS FGA, AWS Lambda Authorizers, and Amazon S3.
Please try a different search
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.