A detailed glimpse at Project Horizon: an internal code factory at WorkOS.
Grant agents time-limited access to OAuth connections using Pipes and MCP.
Develop with WorkOS entirely from your terminal, with agent-ready tooling built in.
AuthKit now supports sessions for public clients, like mobile and single-page apps. Use the WorkOS React SDK to keep your users logged in for longer while keeping them safe from attacks.
Learn what PKCE is, why it's essential for securely authenticating users in mobile and single-page apps, and how you can keep your users safe by using AuthKit and WorkOS.
An in-depth look at fine-grained permissions, their benefits, challenges, use cases, and best practices for implementation.
Learn how Log in with Microsoft can lead to a complete account takeover and how you can protect your app and your users.
Certificate renewal flow, organization switching APIs, modeling your app docs, provider icons API
Learn key user management features for SaaS apps like secure login, onboarding, and role management. Get implementation tips with WorkOS.
Explore Attribute-Based Access Control examples across various sectors, including corporate data access, healthcare, finance, and more.
Learn what granular control is, how it works, its benefits, and some practical examples.
Explore Role-Based Access Control examples across industries like corporate, healthcare, finance, education, government, e-commerce, and media.
For high-growth startups, time is the single most important resource. It’s so important that months of delay in shipping SSO and SCIM can result in a potential revenue loss of $7.95M compared to using a pre-built solution. The ROI difference is staggering too: 9% for a homegrown solution vs. 1,954% for a pre-built one. This article explains the methodologies used to calculate these numbers.
Explore why businesses seek Clerk alternatives, featuring top options like WorkOS, Auth0, Okta, Firebase, and OneLogin.
Learn what data access control is, why it matters, the various types, when to implement it, and effective strategies for doing so.
A breakdown of the five main types of access control models: Discretionary, Mandatory, Role-Based, Attribute-Based, and Relationship-Based access control.
Learn how to implement access control in your organization with our comprehensive guide and best practices.
Learn about the different API authentication methods, including how they work, their use cases, and best practices to follow.
Please try a different search
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
We use cookies for analytics and advertising. See our cookie policy for details.