Resource Center

Engineering

Stay updated with the latest best practices, product updates, and expert tips on building secure, seamless user experiences with Authgear.

OIDC Specification Explained: Key Concepts Developers Need
Engineering

OIDC Specification Explained: Key Concepts Developers Need

Understand the OIDC specification with a practical breakdown of flows, tokens, claims, scopes, and endpoints. Learn the key concepts developers actually need to implement secure authentication.

Jan 9, 2026
Common OAuth 2.0 Grant Types and When You Should Use Each One
Engineering

Common OAuth 2.0 Grant Types and When You Should Use Each One

Learn about the most common OAuth 2.0 grant types, how they work, and when to use each one. A practical guide for developers and security teams.

Jan 5, 2026
Demonstrating Proof-of-Possession (DPoP): A Complete Guide for Modern OAuth Security
Engineering

Demonstrating Proof-of-Possession (DPoP): A Complete Guide for Modern OAuth Security

Learn what Demonstrating Proof-of-Possession (DPoP) is, why it’s important for secure APIs, and how to implement it. Includes practical examples for developers.

Dec 10, 2025
Base64 Made Easy: How to Encode and Decode Data
Engineering

Base64 Made Easy: How to Encode and Decode Data

Learn how Base64 encoding works, why it’s used, and how to encode or decode data safely. Includes practical examples and a free online Base64 tool.

Dec 3, 2025
What is SCIM Provisioning and How Does it Work?
Engineering

What is SCIM Provisioning and How Does it Work?

Learn what SCIM provisioning is, how it works, its benefits and drawbacks, and how SaaS teams can implement it securely and at scale.

Dec 1, 2025
How Do Authenticator Apps Work?
Engineering

How Do Authenticator Apps Work?

Learn how authenticator apps work: TOTP secrets, QR provisioning, clock drift, recovery codes, and why passkeys (WebAuthn) stop phishing.

Nov 7, 2025
Why HMAC Is Still a Must-Have for API Security in 2025
Engineering

Why HMAC Is Still a Must-Have for API Security in 2025

Discover why HMAC remains the foundation of secure API authentication in 2025. Learn how it protects APIs, prevents tampering, and ensures message integrity.

Oct 6, 2025
Generate & Verify HMAC Signatures in Python, Node.js, Go
Engineering

Generate & Verify HMAC Signatures in Python, Node.js, Go

Learn how to generate and verify HMAC signatures in Python, Node.js, and Go. Secure your API with practical examples, code snippets, and a free online HMAC generator.

Oct 6, 2025
OTP Bypass: How OTP Bots Beat SMS 2FA (+ Fixes)
Engineering

OTP Bypass: How OTP Bots Beat SMS 2FA (+ Fixes)

See how OTP bot apps bypass SMS 2FA and ship fixes fast: adaptive CAPTCHA, entity rate limits, risk scoring, and Authgear fraud protection.

Sep 9, 2025
5 Common TOTP Mistakes Developers Make (and How to Fix Them in 2026)
Engineering

5 Common TOTP Mistakes Developers Make (and How to Fix Them in 2026)

TOTP codes not working in 2026? See the 5 most common mistakes developers make — clock drift, Base32 secrets, RFC 6238 mismatches, and weak verification logic — and how to fix each one with Python and JavaScript code examples.

Aug 27, 2025
What is TOTP? A short guide for developers (RFC 6238 explained)
Engineering

What is TOTP? A short guide for developers (RFC 6238 explained)

What is TOTP (Time-based One-Time Password)? A concise RFC 6238 explanation for developers with code examples (Node, Python, Go), troubleshooting tips, and a free online TOTP tool.

Aug 27, 2025
The Complete Guide to Machine-to-Machine (M2M) Authentication — OAuth Client Credentials Flow
Engineering

The Complete Guide to Machine-to-Machine (M2M) Authentication — OAuth Client Credentials Flow

Learn how M2M tokens work, implement OAuth 2.0 Client Credentials, host JWKS, rotate keys, and secure service-to-service authentication with examples in curl, Node, Python, and Go.

Aug 22, 2025 10 min read
What Is JWKS? JSON Web Key Set and JWKS URI Explained
Engineering

What Is JWKS? JSON Web Key Set and JWKS URI Explained

Learn what JWKS is, how JWKS URI works, JWK format examples, and practical tips to generate and manage keys for secure token verification.

Aug 14, 2025 6 min read
JWE vs JWT: Key Differences, Use Cases, and Security Tips
Engineering

JWE vs JWT: Key Differences, Use Cases, and Security Tips

Learn the differences between JWE and JWT, when to use each, and how to secure your tokens. Includes free debugging and key generation tools.

Aug 13, 2025 5 min read
JWT Authentication: A Secure & Scalable Solution for Modern Applications
Engineering

JWT Authentication: A Secure & Scalable Solution for Modern Applications

Learn how JWT authentication works, its pros and cons, and when to use it for secure, scalable applications. Explore alternatives like OAuth, API keys, and SAML for authentication and access management.

Jan 17, 2025
What is Role-Based Access Control (RBAC)? Benefits, Comparisons, and Best Practices
Engineering

What is Role-Based Access Control (RBAC)? Benefits, Comparisons, and Best Practices

Learn everything about role-based access control (RBAC), its benefits, pros and cons, key rules, and comparisons with ABAC and ACL. Discover how Authgear simplifies RBAC for secure and scalable access management.

Dec 6, 2024
PKCE in OAuth 2.0: How to Protect Your API from Attacks
Engineering

PKCE in OAuth 2.0: How to Protect Your API from Attacks

Learn everything you need to know about PKCE, a security extension for OAuth 2.0 that helps protect your API from authorization code interception and other attacks. Discover how PKCE works, its benefits, and best practices for implementation.

Nov 13, 2024
How to Add Authentication to a React Native app in 10 Minutes
Engineering

How to Add Authentication to a React Native app in 10 Minutes

In this we teach how add a full user authentication feature to any React Native application under 10 minutes.

Aug 1, 2024
How Does Biometric Authentication Work? A Comprehensive Guide to the Future of Security
Engineering

How Does Biometric Authentication Work? A Comprehensive Guide to the Future of Security

Discover how biometric authentication works, from fingerprints to facial recognition. Explore the technology, benefits, challenges, and its role in shaping the future of secure identity verification.

Jul 30, 2024
Password Hashing: How to Pick the Right Hashing Function
Engineering

Password Hashing: How to Pick the Right Hashing Function

Almost all popular online services use some form of hash technique to store passwords securely. In this post we cover the different hashing functions, best practices and how to pick the best one for your application and organisation.

Jul 23, 2024
Add Social Login to Your Laravel Project Using any Provider
Engineering

Add Social Login to Your Laravel Project Using any Provider

Social login allows users to log in to your website using their existing account on social sites like Facebook, Twitter (X), and Google. In this post, we show how to implement social login in a Laravel project using any social login provider.

Oct 24, 2023
Defend Against Broken Access Control: Protect Your Application Today
Engineering

Defend Against Broken Access Control: Protect Your Application Today

What is Broken Access Control? Clear examples, API/IDOR scenarios, and a practical prevention checklist (RBAC/ABAC, deny-by-default, testing). Updated for the coming OWASP Top 10 2025.

Aug 31, 2023 4 min read
How OAuth 2.0 Works: A Developer's Guide (2026)
Engineering

How OAuth 2.0 Works: A Developer's Guide (2026)

OAuth 2.0 is the standard behind "Sign in with Google" and every major API. Here's exactly how it works, with diagrams and code.

Aug 30, 2023 8 min read
Authentication for ASP.NET apps with Authgear and OpenID Connect
Engineering

Authentication for ASP.NET apps with Authgear and OpenID Connect

This blog post demonstrates how to add authentication features to ASP.NET apps with Authgear by implementing an OpenID Connect flow.

Aug 15, 2023