Open in app

Sign In

Write

Sign In

Super Tokens
Super Tokens

82 Followers

Home

About

Published in HackerNoon.com

·Pinned

The best way to securely manage user sessions

Writer’s edit: I feel like I should thank everyone for the overwhelming positive response — and more than anything, I am glad that this article is useful for the developer community! …

Open Source

7 min read

The best way to securely manage user sessions
The best way to securely manage user sessions
Open Source

7 min read


Jan 30

Creating Great Authentication Experiences with Custom UI

by Supertokens Team Table of Contents Introduction Custom UI, authentication that feels native Native experiences, happy users Building the next generation of authentication Introduction We’re excited to announce the ability to easily build your own customized user authentication experience with SuperTokens. While SuperTokens comes with a pre-built UI, we’ve launched the supertokens-web-js SDK for…

Authentication

4 min read

Creating Great Authentication Experiences with Custom UI
Creating Great Authentication Experiences with Custom UI
Authentication

4 min read


Jan 16

5 Tips for Optimizing Your React App’s Performance

by Supertokens Team Table of contents Introduction Tip 1: Reduce unnecessary renders Tip 2: Lazy loading with code splitting Tip 3: Debouncing and Throttling Tip 4: Virtualize long lists Tip 5: Optimizing your images Conclusion Introduction One of the most frustrating things as a React developer is investing time and effort into building an…

4 min read

5 Tips for Optimizing Your React App’s Performance
5 Tips for Optimizing Your React App’s Performance

4 min read


Jan 13

What do pre-built authentication UIs look like?

by Supertokens team Table of contents Introduction AWS Cognito Hosted UI Auth0 Universal Login Firebase Authentication Keycloak SuperTokens Introduction Authentication is an important part of every application’s user journey. A poorly made auth screen can be jarring or even discourage users from signing up. …

Aws Cognito Hosted Ui

6 min read

What do pre-built authentication UIs look like?
What do pre-built authentication UIs look like?
Aws Cognito Hosted Ui

6 min read


Nov 16, 2022

Auth0 Pricing: The Complete Guide [2022]

by Supertokens Team Table of Contents What is Auth0? Auth0 Pricing Auth0 Alternative: SuperTokens What is Auth0? Auth0 is an authentication and authorization provider. It started in 2013 as an identity and access management (IAM) service to allow developers to connect their apps to enterprise and social providers easily. Over the years, they have scaled their…

Auth 0

5 min read

Auth0 Pricing: The Complete Guide [2022]
Auth0 Pricing: The Complete Guide [2022]
Auth 0

5 min read


Nov 16, 2022

AWS Cognito Pricing: The Complete Guide [2022]

by Supertokens Team Table of Contents What is AWS Cognito? AWS Cognito Pricing AWS Cognito Alternative: SuperTokens What is AWS Cognito? AWS Cognito is a service that provides authentication, authorization, and user management for web and mobile apps. …

Aws Cognito

3 min read

AWS Cognito Pricing: The Complete Guide [2022]
AWS Cognito Pricing: The Complete Guide [2022]
Aws Cognito

3 min read


Nov 16, 2022

Okta Pricing: The Complete Guide [2022]

by Supertokens Team — Table of Contents What is Okta? Okta Pricing Okta Alternative: SuperTokens What is Okta? With an emphasis on workforce identity solutions, Okta is a leader in the enterprise authentication space, offering identity products to secure employees and business resources within an organization. To bolster its position as a market leader in the Authentication space, Okta has…

Okta

3 min read

Okta Pricing: The Complete Guide [2022]
Okta Pricing: The Complete Guide [2022]
Okta

3 min read


Nov 14, 2022

What is CORS?

Table Of Contents: Introduction CORS History CORS preflight request CORS actual request Wildcards in CORS CORS vulnerability Conclusion Introduction Cross-Origin Resource Sharing (CORS) is a mechanism that supports secure requests and data transfers from outside origins (domain, scheme, or port). For example, example.com uses a text font that's hosted on fonts.com. When visiting example.com…

Cors

6 min read

What is CORS?
What is CORS?
Cors

6 min read


Nov 3, 2022

Introducing User Roles Authorization with SuperTokens

Table of Contents Part 1 — Introducing user roles and understanding why authorization matters Introduction What are user roles and why are they important for user authentication? User Roles and SuperTokens Part 2 — Implementing user roles with SuperTokens Introduction Step 1. Creating the roles and permissions Step 2. Assigning roles to users…

Rbac

6 min read

Introducing User Roles Authorization with SuperTokens
Introducing User Roles Authorization with SuperTokens
Rbac

6 min read


Nov 3, 2022

What is Roles-Based Access Control (RBAC)?

by Supertokens Team Roles-based access control (RBAC) is a security approach that uses roles to define what a user is and isn’t allowed to do. In a RBAC system, users are assigned roles with varying permissions for different resources, including files, databases, and applications. So, when a user tries to…

Rbac

4 min read

What is Roles-Based Access Control (RBAC)?
What is Roles-Based Access Control (RBAC)?
Rbac

4 min read

Super Tokens

Super Tokens

82 Followers

https://supertokens.com

Following
  • Nemi Shah

    Nemi Shah

  • David Leangen

    David Leangen

  • Johan Sydseter

    Johan Sydseter

  • #BlackLivesMatter

    #BlackLivesMatter

  • Vito Baccaro

    Vito Baccaro

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech