A detailed glimpse at Project Horizon: an internal code factory at WorkOS.
Grant agents time-limited access to OAuth connections using Pipes and MCP.
Develop with WorkOS entirely from your terminal, with agent-ready tooling built in.
Daytona CEO Ivan Burazin explains why every AI agent needs its own computer, how he built an AI with its own identity, and why SaaS is shifting from seats to consumption.
Assembled CEO John Wang explains why AI is growing support teams, not shrinking them, and why orchestration is the real differentiator in customer support.
Cosmo Wolfe explains why AI companies are rethinking pricing, why per-seat models are dying, and what Stripe's Machine Payment Protocol means for agents as buyers.
Augment Code CEO Matt McClernan discusses the rapid shift from AI code completions to agent orchestration at HumanX 2026, interviewed by WorkOS CEO Michael Grinich.
Noam Schwartz of Alice explains why prompt injection is the new SQL injection and what enterprises deploying AI agents need to know about trust and safety.
Three mechanisms guard three different checkpoints in OAuth and OpenID Connect. Here is why none of them is optional.
Why teams outgrow Amazon Cognito and which authentication platforms handle enterprise SSO, multi-tenancy, and directory sync without the glue code.
Slack, Notion, and Linear each take a different approach to per-tenant roles and permissions. Here are the patterns worth stealing for your own app.
Master secure authentication in Node.js from Passport.js and JWTs to enterprise SSO, with production-ready patterns and security best practices.
How attackers turn legitimate consent prompts into persistent backdoors, and what your team can do about it.
A deep dive into the FIDO2/WebAuthn protocol mechanics that tie every passkey to a specific domain, making credential theft physically impossible at the cryptographic layer.
What to use when your B2B auth needs outpace PropelAuth.
30 CVEs in 60 days, a backdoored npm package stealing emails, and a hosting platform flaw that put 3,000 servers at risk. Here's how to secure the supply chain your AI agents depend on.
A complete breakdown of one of the most dangerous JWT vulnerabilities, from the cryptographic mechanics to the defensive code patterns that stop it.
Symmetric vs asymmetric JWT signatures: how each algorithm works, when to use which, and the security tradeoffs every developer should know
Please try a different search
Our global team is growing and we’re hiring all types of roles.
WorkOS builds developer tools for quickly adding enterprise features to applications.
This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.