Resource Center

Highlight

Stay updated with the latest best practices, product updates, and expert tips on building secure, seamless user experiences with Authgear.

How to Migrate From Auth0 to an Open-Source Identity Provider
Highlight

How to Migrate From Auth0 to an Open-Source Identity Provider

Learn how to migrate from Auth0 to an open-source identity provider with this step-by-step guide. Covers planning, data export, implementation, SDK updates, testing, and go-live best practices.

Dec 16, 2025
Master Attribute-Based Access Control with Authgear – Ultimate Security Guide
Highlight

Master Attribute-Based Access Control with Authgear – Ultimate Security Guide

Discover how attribute-based access control enhances your software's security. Learn implementation steps, benefits, and a comparison with RBAC in our comprehensive Authgear guide.

Mar 10, 2025
Broken Authentication: What Is It and How to Prevent It
Highlight

Broken Authentication: What Is It and How to Prevent It

Broken authentication is one of the OWASP Top 10 vulnerabilities that involves hackers impersonating users to compromise data security. See what the causes are and how to avoid broken authentication.

Nov 3, 2022
Passkeys Compatibility: Which Platforms Support Passkeys?
Highlight

Passkeys Compatibility: Which Platforms Support Passkeys?

Passkeys are now supported by iOS, macOS, Chrome and Android. Learn more about passkeys and their compatibility with major browsers and platforms.

Aug 25, 2022
6 Tips to Strengthen Your Security: Authentication Best Practices Guide
Highlight

6 Tips to Strengthen Your Security: Authentication Best Practices Guide

Protect your web application and authentication server with expert guidance. Learn essential authentication best practices, including securing login processes, password management, and server protection. Discover how Authgear can simplify your authentication and enhance security.

Feb 21, 2022
Session vs Token Authentication
Highlight

Session vs Token Authentication

Understand session-based vs token-based authentication, cookies vs JWT, pros/cons, CSRF/XSS trade-offs, and when to use each—plus examples.

Nov 25, 2021