WorkOSJuly UpdatesRBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination RBAC for AuthKit, Fine-Grained Authorization early access, SCIM role assignment, updated Node SDK, and new Log Streams destination Introducing RBAC for AuthKit Introducing RBAC for AuthKit Introducing RBAC for AuthKit Introducing RBAC for AuthKit AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users AuthKit now supports creating and attaching custom permissions to user roles, providing a complete Role-Based Access Control (RBAC) solution for users Read more about the launch → Read more about the launch → Read more about the launch → Read more about the launch → Read more about the launch → Fine-Grained Authorization Fine-Grained Authorization Fine-Grained Authorization Fine-Grained Authorization Early access for FGA is now available for teams using Node and Go. Early access for FGA is now available for teams using Node and Go. Early access for FGA is now available for teams using Node and Go. Read more about FGA early access → Read more about FGA early access → Read more about FGA early access → Read more about FGA early access → Read more about FGA early access → SCIM role assignment SCIM role assignment SCIM role assignment SCIM role assignment Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Your customers can now use the Admin Portal to map role data that exist in their identity providers to roles that are configured in your app. Read about SCIM role assignment → Read about SCIM role assignment → Read about SCIM role assignment → Read about SCIM role assignment → Read about SCIM role assignment → New generic Log Streams destination: HTTP POST New generic Log Streams destination: HTTP POST New generic Log Streams destination: HTTP POST New generic Log Streams destination: HTTP POST Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Audit Logs now supports a generic Log Streams destination, HTTP POST, that can be streamlined to any SIEM provider that accepts HTTP POST requests with a JSON payload. Read more about the new Log Streams destination → Read more about the new Log Streams destination → Read more about the new Log Streams destination → Read more about the new Log Streams destination → Read more about the new Log Streams destination → Improved session handling in the Node SDK Improved session handling in the Node SDK Improved session handling in the Node SDK Improved session handling in the Node SDK The SDK can be used to handle signing, encrypting session data, and managing JWTs. The SDK can be used to handle signing, encrypting session data, and managing JWTs. The SDK can be used to handle signing, encrypting session data, and managing JWTs. Learn more about the updated SDK → Learn more about the updated SDK → Learn more about the updated SDK → Learn more about the updated SDK → Learn more about the updated SDK → More featured content More featured content More featured content More featured content Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unlocking the power of SCIM: streamlining enterprise user managementImplementation challenges of a homegrown SCIM solutionThe developer's guide to RBAC part I: RBAC vs. FGAThe developer’s guide to RBAC part II: IdP syncsHow Prefect saved over 300 hours of onboarding time with WorkOSHow Warp leveraged WorkOS for a modular and seamless SSO integration Unlocking the power of SCIM: streamlining enterprise user management Unlocking the power of SCIM: streamlining enterprise user management Implementation challenges of a homegrown SCIM solution Implementation challenges of a homegrown SCIM solution The developer's guide to RBAC part I: RBAC vs. FGA The developer's guide to RBAC part I: RBAC vs. FGA The developer’s guide to RBAC part II: IdP syncs The developer’s guide to RBAC part II: IdP syncs How Prefect saved over 300 hours of onboarding time with WorkOS How Prefect saved over 300 hours of onboarding time with WorkOS How Warp leveraged WorkOS for a modular and seamless SSO integration How Warp leveraged WorkOS for a modular and seamless SSO integration Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSJune UpdatesDeveloper Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. View the API to enroll an authentication factor → Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. View authkit-remix on GitHub → More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap, Apple OAuth, User Management with SCIM, IdP role assignment, Remix example app Developer Week recap Developer Week recap Developer Week recap Developer Week recap We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: We recently concluded Developer Week, where our engineering team shared takeaways and lessons learned from shipping features and other critical projects. Here is a recap: Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Migrating to the Next.js App Router with zero downtimeTrade-offs of authenticating users with MiddlewareResolving webhooks limitations with the Events APIFrom four to five 9s of uptime by migrating to KubernetesHidden complexities of identity linking Migrating to the Next.js App Router with zero downtime Migrating to the Next.js App Router with zero downtime Trade-offs of authenticating users with Middleware Trade-offs of authenticating users with Middleware Resolving webhooks limitations with the Events API Resolving webhooks limitations with the Events API From four to five 9s of uptime by migrating to Kubernetes From four to five 9s of uptime by migrating to Kubernetes Hidden complexities of identity linking Hidden complexities of identity linking Sign in with Apple Sign in with Apple Sign in with Apple Sign in with Apple WorkOS now supports Apple OAuth as a Single Sign-On authentication method. WorkOS now supports Apple OAuth as a Single Sign-On authentication method. WorkOS now supports Apple OAuth as a Single Sign-On authentication method. Learn how to set up Apple OAuth → Learn how to set up Apple OAuth → Learn how to set up Apple OAuth → Learn how to set up Apple OAuth → Learn how to set up Apple OAuth → User Management with SCIM and Google Workspace User Management with SCIM and Google Workspace User Management with SCIM and Google Workspace User Management with SCIM and Google Workspace User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). User Management now supports automatic user provisioning and de-provisioning via SCIM and Google Workspace directories. This means your enterprise customer can integrate their identity provider to enable automatic user lifecycle management (ULM). Read about automatic user provisioning in the docs → Read about automatic user provisioning in the docs → Read about automatic user provisioning in the docs → Read about automatic user provisioning in the docs → Read about automatic user provisioning in the docs → Identity provider role assignment Identity provider role assignment Identity provider role assignment Identity provider role assignment Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Directory Sync now supports “roles” on the Directory User. Roles on directory users can be configured by a user’s group memberships. You can now map group memberships to roles on the WorkOS Dashboard under the directory settings. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Once roles for your application are configured, you can enable role assignment for IT Admins in the Admin Portal. Read about IdP role assignment in the docs → Read about IdP role assignment in the docs → Read about IdP role assignment in the docs → Read about IdP role assignment in the docs → Read about IdP role assignment in the docs → Developer-provided TOTP secrets Developer-provided TOTP secrets Developer-provided TOTP secrets Developer-provided TOTP secrets With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. With the new totp_secret parameter on the enroll authentication factor endpoint, you can migrate existing TOTP MFA factors to WorkOS without re-prompting your users for MFA enrollment. totp_secret View the API to enroll an authentication factor → View the API to enroll an authentication factor → View the API to enroll an authentication factor → View the API to enroll an authentication factor → View the API to enroll an authentication factor → Remix example app and helper library for AuthKit Remix example app and helper library for AuthKit Remix example app and helper library for AuthKit Remix example app and helper library for AuthKit We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. We now have an example app demonstrating how to integrate AuthKit in your Remix application. It uses the newly released authkit-remix helper library to make your AuthKit integration possible in just a few lines of code. example app authkit-remix View authkit-remix on GitHub → View authkit-remix on GitHub → View authkit-remix on GitHub → View authkit-remix on GitHub → View authkit-remix on GitHub → More featured content More featured content More featured content More featured content User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application User Management crash courseAuthKit-Remix tutorialAdding AuthKit to a Next.js App Router application User Management crash course User Management crash course AuthKit-Remix tutorial AuthKit-Remix tutorial Adding AuthKit to a Next.js App Router application Adding AuthKit to a Next.js App Router application Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSMay UpdatesSend your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own AuthKit emails, PKCE support for SSO, Events API for filtering orgs, soft deletion support in User Management Send your own emails for AuthKit Send your own emails for AuthKit Send your own emails for AuthKit Send your own emails for AuthKit For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. For more control over email content and deliverability, you can now turn off default emails related to User Management, such as password reset and Magic Auth, and send customized emails instead. Learn more about sending your own AuthKit emails → Learn more about sending your own AuthKit emails → Learn more about sending your own AuthKit emails → Learn more about sending your own AuthKit emails → Learn more about sending your own AuthKit emails → PKCE support for SSO PKCE support for SSO PKCE support for SSO PKCE support for SSO Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Proof Key for Code Exchange (PKCE) enhances the security of the OAuth 2.0 Authorization Code Flow by allowing applications that cannot securely store a client secret, like native or single-page apps, to securely obtain access tokens. If you are developing a client that makes API calls in public, you’ll need to use this flow. Learn more about PKCE support for SSO → Learn more about PKCE support for SSO → Learn more about PKCE support for SSO → Learn more about PKCE support for SSO → Learn more about PKCE support for SSO → Events API for organization filtering Events API for organization filtering Events API for organization filtering Events API for organization filtering The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. The Events API now supports an optional organization ID parameter that allows you to filter events that have occurred in a specific organization. This change is available on our Node, Python, Go, and Ruby SDKs. Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Deactivate organization memberships in User Management Deactivate organization memberships in User Management Deactivate organization memberships in User Management Deactivate organization memberships in User Management The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. The User Management API now supports deactivating and reactivating organization memberships to natively support soft deletion use cases. This enables persisting an organization member’s resources, but revoking access. Learn more about deactivating organization memberships → Learn more about deactivating organization memberships → Learn more about deactivating organization memberships → Learn more about deactivating organization memberships → Learn more about deactivating organization memberships → Sign-in on signup Sign-in on signup Sign-in on signup Sign-in on signup We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. We’ve streamlined the email and password signup flow in AuthKit. Users are now automatically signed in upon successful registration, reducing friction and improving the overall experience. Learn more about sign-in on signup → Learn more about sign-in on signup → Learn more about sign-in on signup → Learn more about sign-in on signup → Learn more about sign-in on signup → PHP example app for AuthKit PHP example app for AuthKit PHP example app for AuthKit PHP example app for AuthKit This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. This new example app showcases how to integrate AuthKit in PHP with full session management. Built with vanilla PHP, it shows how to easily add AuthKit to any PHP app, regardless of framework. Learn more about the PHP example app → Learn more about the PHP example app → Learn more about the PHP example app → Learn more about the PHP example app → Learn more about the PHP example app → User Management migration docs from Clerk User Management migration docs from Clerk User Management migration docs from Clerk User Management migration docs from Clerk A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. A guide on migrating from Clerk to WorkOS is now available, as well as new tooling that provides a streamlined import process. Read the migration docs → Read the migration docs → Read the migration docs → Read the migration docs → Read the migration docs → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSApril UpdatesGitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHub secret scanning partnership, API endpoints to retrieve user’s auth methods and IdP identifiers, and Perplexity Enterprise Pro for all customers GitHut secret scanning partnership GitHut secret scanning partnership GitHut secret scanning partnership GitHut secret scanning partnership We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. We’ve partnered with GitHub to support scanning for leaked WorkOS secrets exposed in public repositories and packages. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. WorkOS will immediately notify developers when a leaked secret is detected in a GitHub repository, allowing them to take steps to remediate the exposure. Learn how to be more vigilant with leaked secrets → Learn how to be more vigilant with leaked secrets → Learn how to be more vigilant with leaked secrets → Learn how to be more vigilant with leaked secrets → Learn how to be more vigilant with leaked secrets → Specify landing page when generating an authorization URL Specify landing page when generating an authorization URL Specify landing page when generating an authorization URL Specify landing page when generating an authorization URL Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. Developers can now use the screen_hint parameter when generating an authorization URL to direct users to either the sign-in or sign-up screen in AuthKit. screen_hint This enhancement offers more control over authentication flows in the developer’s application. This enhancement offers more control over authentication flows in the developer’s application. This enhancement offers more control over authentication flows in the developer’s application. Learn more about the enhanced authentication flow → Learn more about the enhanced authentication flow → Learn more about the enhanced authentication flow → Learn more about the enhanced authentication flow → Learn more about the enhanced authentication flow → Retrieve external IdP identifiers of a user Retrieve external IdP identifiers of a user Retrieve external IdP identifiers of a user Retrieve external IdP identifiers of a user Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Developers can use a new API endpoint to retrieve identifiers of a user from external identity providers. At the moment, we support Microsoft, GitHub, and Google OAuth providers. Learn more about the new API endpoint → Learn more about the new API endpoint → Learn more about the new API endpoint → Learn more about the new API endpoint → Learn more about the new API endpoint → Google Groups filtering in the Dashboard Google Groups filtering in the Dashboard Google Groups filtering in the Dashboard Google Groups filtering in the Dashboard The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. The WorkOS Dashboard now allows configuration of group syncing for Google Workspace Directories. Learn more about Google Groups filtering → Learn more about Google Groups filtering → Learn more about Google Groups filtering → Learn more about Google Groups filtering → Learn more about Google Groups filtering → Authentication method now included in authenticate response Authentication method now included in authenticate response Authentication method now included in authenticate response Authentication method now included in authenticate response The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. The response to the User Management authenticate endpoint now includes information about the authentication method of a user. This is useful if you need to switch some logic based on whether a user authenticated by, for example, GitHub OAuth, SSO, or Password. Learn how to add user’s authentication method → Learn how to add user’s authentication method → Learn how to add user’s authentication method → Learn how to add user’s authentication method → Learn how to add user’s authentication method → Special offer for all WorkOS customers: Perplexity Enterprise Pro Special offer for all WorkOS customers: Perplexity Enterprise Pro Special offer for all WorkOS customers: Perplexity Enterprise Pro Special offer for all WorkOS customers: Perplexity Enterprise Pro Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Perplexity Enterprise Pro is now available for free to all WorkOS customers for 3 months. Usage is limited to 10 seats per organization. Learn more about the special offer → Learn more about the special offer → Learn more about the special offer → Learn more about the special offer → Learn more about the special offer → More featured content More featured content More featured content More featured content Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management.Next.js auth tutorial with RSCs and Server ActionsRefactoring an existing Remix app to use AuthKit for authentication and user management Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management. Copy.ai picks WorkOS as the sole auth provider for SSO, SCIM, and User Management. Next.js auth tutorial with RSCs and Server Actions Next.js auth tutorial with RSCs and Server Actions Refactoring an existing Remix app to use AuthKit for authentication and user management Refactoring an existing Remix app to use AuthKit for authentication and user management Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSWorkOS acquires WarrantA major step in WorkOS's vision to become the world's best platform for identity, authentication, and authorization. Over the coming months, we'll be working to integrate Warrant's FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Read the announcement Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS acquires Warrant WorkOS acquires Warrant WorkOS acquires Warrant Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. Today, we announced the acquisition of Warrant, the Fine Grained Authorization (FGA) service for developers. This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). This is a major step in WorkOS’s vision to become the world’s best platform for identity, authentication, and authorization. Over the coming months, we’ll be working to integrate Warrant’s FGA technology into WorkOS alongside existing products like enterprise Single Sign-On (SAML), Directory Sync (SCIM), User Management (CIAM), and Audit Logs (SIEM). We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. We are incredibly excited to join forces with Warrant. If you are currently looking to build Role-Based Access Control (RBAC) or Fine Grained Authorization (FGA) in your app, please reach out for access to the preview release. Check out our blog to hear more about this exciting news: Check out our blog to hear more about this exciting news: Check out our blog to hear more about this exciting news: Read the announcement Read the announcement Read the announcement Read the announcement Read the announcement Read the announcement Read the announcement Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSMarch UpdatesSessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support. Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions, Roles, Impersonation, streaming to Datadog, and new JavaScript runtimes support Sessions Sessions Sessions Sessions Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. Session management is a mechanism for securely handling interactions between a user and an application within a specific time frame. It’s also an important tool for balancing UX with security and should only take a few lines to wire into your app. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. WorkOS now supports Sessions, which includes server-side revocation, custom expiration times, and device profile information. Learn more about Sessions → Learn more about Sessions → Learn more about Sessions → Learn more about Sessions → Learn more about Sessions → Roles Roles Roles Roles You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. You can now create, assign, and manage custom roles for your users. Roles also auto-populate the WorkOS Sessions API for a seamless end-to-end integration. Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Impersonation Impersonation Impersonation Impersonation Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Impersonation lets you sign in as one of your users, which can be a powerful way to debug issues. Compared to alternatives like screen sharing, written documentation, or shared login credentials, impersonation provides an effective and secure way for your support team to troubleshoot. Learn more about Impersonation → Learn more about Impersonation → Learn more about Impersonation → Learn more about Impersonation → Learn more about Impersonation → Stream WorkOS events to Datadog Stream WorkOS events to Datadog Stream WorkOS events to Datadog Stream WorkOS events to Datadog Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Many important events happen within WorkOS like user signup, password resets, and role updates. With this Datadog integration, you can stream WorkOS events alongside your other logs for additional monitoring and debugging. Learn more about Datadog streaming → Learn more about Datadog streaming → Learn more about Datadog streaming → Learn more about Datadog streaming → Learn more about Datadog streaming → Cloudflare Workers and Edge Middleware support Cloudflare Workers and Edge Middleware support Cloudflare Workers and Edge Middleware support Cloudflare Workers and Edge Middleware support The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. The workos-node library now supports all edge JavaScript runtimes including Deno, Bun, Cloudflare Workers, Vercel, and, of course, Node.js. We’ve also published a Next.js library to make things super easy when working with users, sessions, and roles. Learn more about new JavaScript runtimes support → Learn more about new JavaScript runtimes support → Learn more about new JavaScript runtimes support → Learn more about new JavaScript runtimes support → Learn more about new JavaScript runtimes support → Radix Themes 3.0 Radix Themes 3.0 Radix Themes 3.0 Radix Themes 3.0 With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. With 3.0, our open source component library for building application UIs gets a major upgrade. New components, new layout engine, custom color palette generator, improved out-of-the-box support for Remix and Astro, and docs with guidance on layout and styling. Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Indeed’s migration from Auth0 to WorkOS Indeed’s migration from Auth0 to WorkOS Indeed’s migration from Auth0 to WorkOS Indeed’s migration from Auth0 to WorkOS Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Indeed first evaluated WorkOS to improve the brittleness of their underlying identity infrastructure. Ultimately, the decision to consolidate to WorkOS came down to SCIM support, a transparent pricing model, and the Admin Portal that would save “hours of engineering support” for each customer onboarding. Read more about Indeed’s case study → Read more about Indeed’s case study → Read more about Indeed’s case study → Read more about Indeed’s case study → Read more about Indeed’s case study → The developer’s guide to User Management The developer’s guide to User Management The developer’s guide to User Management The developer’s guide to User Management Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Developer resource for modern day user management, including 101 topics like SSO and MFA, as well as more advanced concepts like identity linking, email verification, and JIT provisioning. Read the guide → Read the guide → Read the guide → Read the guide → Read the guide → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSLaunch Week Bonus Day: Radix Themes 3.0Radix Themes 3.0 introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It's easy to get started, and just as easy to maintain. WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Radix Themes 3.0, the best component library for modern apps Radix Themes 3.0, the best component library for modern apps Radix Themes 3.0, the best component library for modern apps As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. As a bonus for Launch Week, we are excited to announce Radix Themes 3.0, which introduces new components, a new layout engine, custom color palette generator, and improved out-of-the-box support for Remix and Astro. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Radix Themes is an open source system of opinionated, pre-built components and design tokens that developers use to build React apps. Exceptional component API design and advanced visual design distinguish Radix Themes from other component libraries. It’s easy to get started, and just as easy to maintain. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Naturally, WorkOS product UIs use Radix Themes, which makes it battle-tested in demanding environments with hundreds of thousands of users. Radix Themes is customized through Theme configuration, design tokens, and by creating your own components using the library's foundational building blocks. Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → Learn more about Radix Themes 3.0 → That wraps up Launch Week. We appreciate you following along. That wraps up Launch Week. We appreciate you following along. That wraps up Launch Week. We appreciate you following along. As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! As a small token of appreciation, we’ll be sending a WorkOS and Radix-themed sticker pack to everyone that signed up. We’ll also reach out separately to the Analogue Pocket winner. Stay tuned! Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSLaunch Week Day 2: RolesRoles provide an important foundation for authorization and are free to all WorkOS users. Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Roles are now available to all users Roles are now available to all users Roles are now available to all users Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Roles are defined by sets of permissions that determine the types of actions a user can perform. Typically, roles are assigned based on users’ job functions, responsibilities, or tasks they need to perform, which provide an important foundation for authorization. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Starting today, roles are now available to all users for free. When a user session is initiated, the role information will be included by default. Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Learn more about Roles → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSFebruary UpdatesTest SSO, organization auth policies, and why Hypercare migrated from Auth0 WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO, organization auth policies, and why Hypercare migrated from Auth0 Introducing Test SSO Introducing Test SSO Introducing Test SSO Introducing Test SSO Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Your staging environment now includes a Test SSO page and comes pre-configured with the Test Organization that is connected to the Work OS Test Identity Provider. Use the Test Identity Provider to easily validate the user experience of various login scenarios, including service provider-initiated, identity provider-initiated, guest email domains, and error responses. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Test SSO works both with standalone Single Sign-On integrations and AuthKit/User Management. Learn more about Test SSO → Learn more about Test SSO → Learn more about Test SSO → Learn more about Test SSO → Learn more about Test SSO → Organization auth policies Organization auth policies Organization auth policies Organization auth policies Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Organizations can now customize authentication policies for its members. This gives greater control to your customers to match your application’s authentication to their security standards. Learn more about organization auth policies → Learn more about organization auth policies → Learn more about organization auth policies → Learn more about organization auth policies → Learn more about organization auth policies → Profile pictures from OAuth providers Profile pictures from OAuth providers Profile pictures from OAuth providers Profile pictures from OAuth providers User Management will now include OAuth profile pictures as part of the user metadata returned to your application. User Management will now include OAuth profile pictures as part of the user metadata returned to your application. User Management will now include OAuth profile pictures as part of the user metadata returned to your application. Learn more about profile pictures from OAuth providers → Learn more about profile pictures from OAuth providers → Learn more about profile pictures from OAuth providers → Learn more about profile pictures from OAuth providers → Learn more about profile pictures from OAuth providers → Why Hypercare migrated from Auth0 Why Hypercare migrated from Auth0 Why Hypercare migrated from Auth0 Why Hypercare migrated from Auth0 As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. As Hypercare continued to scale, they searched for a new solution that could support SCIM provisioning, a streamlined admin onboarding flow, and predictable pricing. While the team had been using Auth0 for SSO, consolidating with WorkOS seemed like a more ideal partnership for future growth. Learn more about Hypercare’s migration story → Learn more about Hypercare’s migration story → Learn more about Hypercare’s migration story → Learn more about Hypercare’s migration story → Learn more about Hypercare’s migration story → More featured content More featured content More featured content More featured content A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit A guide to organization modelingFAQ for for your customer’s IT teamsCreating stronger passwords with AuthKit A guide to organization modeling A guide to organization modeling FAQ for for your customer’s IT teams FAQ for for your customer’s IT teams Creating stronger passwords with AuthKit Creating stronger passwords with AuthKit Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSJanuary Product UpdatesBot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit, Organization filtering in Dashboard, Auth0 pricing comparison, and more Bot Protection in AuthKit Bot Protection in AuthKit Bot Protection in AuthKit Bot Protection in AuthKit Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Hosted AuthKit now includes bot detection in all critical workflows, providing automatic protection against unauthorized account signups. Learn more about Bot Protection → Learn more about Bot Protection → Learn more about Bot Protection → Learn more about Bot Protection → Learn more about Bot Protection → Organization filtering in the Dashboard Organization filtering in the Dashboard Organization filtering in the Dashboard Organization filtering in the Dashboard The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. The Organizations page in the Dashboard now includes new filtering parameters, enabling teams to sort through specific org information easily. New filters include provider type for SSO and Directory Sync, connection status, date of creation, and user count. Learn more about Organization filtering → Learn more about Organization filtering → Learn more about Organization filtering → Learn more about Organization filtering → Learn more about Organization filtering → Filtering Google Workspace directories Filtering Google Workspace directories Filtering Google Workspace directories Filtering Google Workspace directories Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Google Workspace admins will now have the ability to choose and filter which groups are synced through Directory Sync upon setup and post-configuration. These changes will be reflected in the data that is transmitted via events, webhooks, and the API. With this change, admins can now exert more control over the user information being sent to your application via the Admin Portal. Learn more about filtering Google Workspace directories → Learn more about filtering Google Workspace directories → Learn more about filtering Google Workspace directories → Learn more about filtering Google Workspace directories → Learn more about filtering Google Workspace directories → WorkOS vs. Auth0 pricing comparison WorkOS vs. Auth0 pricing comparison WorkOS vs. Auth0 pricing comparison WorkOS vs. Auth0 pricing comparison Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Common complaints around Auth0’s pricing structure include usage gates, non-linear price hikes, and forced sales conversations. This post provides a breakdown of the pricing comparison between two platforms, and how WorkOS offers more competitive and transparent pricing for B2B SaaS companies. Learn more about the Auth0 pricing comparison → Learn more about the Auth0 pricing comparison → Learn more about the Auth0 pricing comparison → Learn more about the Auth0 pricing comparison → Learn more about the Auth0 pricing comparison → Featured customer: Chromatic Featured customer: Chromatic Featured customer: Chromatic Featured customer: Chromatic Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Chromatic had originally relied on an in-house solution built with Passport.js to provide SSO for their enterprise customers but realized they had to spend hours provisioning new connections and deleting SAML users. They wanted a more scalable solution that could support both SSO and SCIM and successfully migrated to WorkOS in less than 2 weeks. Learn more about Chromatic’s migration story → Learn more about Chromatic’s migration story → Learn more about Chromatic’s migration story → Learn more about Chromatic’s migration story → Learn more about Chromatic’s migration story → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOS2023 Product Updates Recap2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS 99.99% availability, Events API, AuthKit, Domain Verification API, and more 99.99% availability, Events API, AuthKit, Domain Verification API, and more 99.99% availability, Events API, AuthKit, Domain Verification API, and more 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. 2023 was a tremendous year of growth for both WorkOS and our customers. The WorkOS platform is now serving over 500 fastest growing SaaS businesses, and we’re excited to see what our customers continue to build with WorkOS. In place of the last product update of the year, here is a recap of the 40+ releases we brought to market across our major product lines in 2023. Single Sign-On Single Sign-On Single Sign-On Single Sign-On 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences 99.99% availability for SSO, Directory Sync, and Audit LogsGroups for SSO usersImproved SAML session viewerAdded support for SAML login and domain hintsImproved SSO configuration experienceEnhanced validation of OIDC connectionsGuide for building SSO user experiences 99.99% availability for SSO, Directory Sync, and Audit Logs 99.99% availability for SSO, Directory Sync, and Audit Logs Groups for SSO users Groups for SSO users Improved SAML session viewer Improved SAML session viewer Added support for SAML login and domain hints Added support for SAML login and domain hints Improved SSO configuration experience Improved SSO configuration experience Enhanced validation of OIDC connections Enhanced validation of OIDC connections Guide for building SSO user experiences Guide for building SSO user experiences Directory Sync Directory Sync Directory Sync Directory Sync The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning The Events API—a new way to sync state from WorkOSDirectory Events viewImproved validation during SCIM setupUser provisioning via SFTPDirectory validation for Google Workspace, SFTP, and WorkdaySecure user state management flowConsolidating group membership fragmentationUser state consolidationAdditional developer documentationA guide to just-in-time user provisioning The Events API—a new way to sync state from WorkOS The Events API—a new way to sync state from WorkOS Directory Events view Directory Events view Improved validation during SCIM setup Improved validation during SCIM setup User provisioning via SFTP User provisioning via SFTP Directory validation for Google Workspace, SFTP, and Workday Directory validation for Google Workspace, SFTP, and Workday Secure user state management flow Secure user state management flow Consolidating group membership fragmentation Consolidating group membership fragmentation User state consolidation User state consolidation Additional developer documentation Additional developer documentation A guide to just-in-time user provisioning A guide to just-in-time user provisioning User Management & AuthKit User Management & AuthKit User Management & AuthKit User Management & AuthKit Introducing User Management & AuthKitGitHub OAuth supportMigration docs Introducing User Management & AuthKitGitHub OAuth supportMigration docs Introducing User Management & AuthKitGitHub OAuth supportMigration docs Introducing User Management & AuthKitGitHub OAuth supportMigration docs Introducing User Management & AuthKit Introducing User Management & AuthKit GitHub OAuth support GitHub OAuth support Migration docs Migration docs Admin Portal Admin Portal Admin Portal Admin Portal Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Custom domains for Admin Portal invite emailsInvite admins to Admin Portal via emailStreamlined setup linksFree custom branding in SandboxImproved validation during SCIM setup Custom domains for Admin Portal invite emails Custom domains for Admin Portal invite emails Invite admins to Admin Portal via email Invite admins to Admin Portal via email Streamlined setup links Streamlined setup links Free custom branding in Sandbox Free custom branding in Sandbox Improved validation during SCIM setup Improved validation during SCIM setup Audit Logs Audit Logs Audit Logs Audit Logs Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Audit Logs API to define event schemaAudit Logs retention period APINew Log Streams destination: Google Cloud Storage Audit Logs API to define event schema Audit Logs API to define event schema Audit Logs retention period API Audit Logs retention period API New Log Streams destination: Google Cloud Storage New Log Streams destination: Google Cloud Storage Platform Platform Platform Platform Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Domain Verification APIEvents pageAll teams can now sign in to the WorkOS Dashboard using SSOCompliance documents in DashboardSelf-serve creation of your shared Slack channelPostman Public WorkspaceBubble plugin Domain Verification API Domain Verification API Events page Events page All teams can now sign in to the WorkOS Dashboard using SSO All teams can now sign in to the WorkOS Dashboard using SSO Compliance documents in Dashboard Compliance documents in Dashboard Self-serve creation of your shared Slack channel Self-serve creation of your shared Slack channel Postman Public Workspace Postman Public Workspace Bubble plugin Bubble plugin Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSIntroducing AuthKit & User Management APIsFlexible open source toolkit for authentication UI with support for both hosted and headless builds. Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. Today, we’re excited to release AuthKit: an open source authentication UI built on Radix that makes it easy to add login UI to any app. AuthKit We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. We’re also launching User Management APIs to handle all related backend tasks, including email verification, account linking, bot blocking, organization modeling, and more. See all features and the API docs. all features API docs This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. This service is free for every developer up to 1,000,000 users. Paid features include SAML, SCIM, and custom domain hosting. See pricing. pricing We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. We can’t wait to see what you’ll build with these new APIs and components. Please follow @AuthKit for more updates about the project. @AuthKit Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSOctober Product UpdatesAdvanced Events view, predictable pricing, custom email domains WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. Learn more about secure user state management flow → More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS Advanced Events view, predictable pricing, custom email domains Advanced Events view, predictable pricing, custom email domains Advanced Events view, predictable pricing, custom email domains Events page for advanced workflow debugging Events page for advanced workflow debugging Events page for advanced workflow debugging Events page for advanced workflow debugging The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. The Events page provides an advanced workflow for debugging scenarios when configuring integrations. Developers can efficiently filter and view event data on a dedicated page, which includes payload information, emitted webhooks for specific events, and associated metadata. Learn more about the Events page → Learn more about the Events page → Learn more about the Events page → Learn more about the Events page → Learn more about the Events page → Automatic volume discounts Automatic volume discounts Automatic volume discounts Automatic volume discounts For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. For SSO and Directory Sync, discounted pricing (20%, 36%, 60%) is now applied when connection thresholds are met. The pricing model is designed for transparency and lower unit costs with scale. View updated pricing → View updated pricing → View updated pricing → View updated pricing → View updated pricing → Custom domains for Admin Portal invites Custom domains for Admin Portal invites Custom domains for Admin Portal invites Custom domains for Admin Portal invites To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. To provide a seamless onboarding experience with consistent branding, developers can now use their own domains when sending Admin Portal invite emails to organizations. Learn more about custom domains for Admin Portal invites → Learn more about custom domains for Admin Portal invites → Learn more about custom domains for Admin Portal invites → Learn more about custom domains for Admin Portal invites → Learn more about custom domains for Admin Portal invites → Secure user state management flow Secure user state management flow Secure user state management flow Secure user state management flow User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. User provisioning categorizes users from various providers as “active,” “inactive,” or “suspended,” but handling the “inactive” and “suspended” users poses challenges due to distinct security requirements. For all new environments, WorkOS will default to deleting these users for cleaner and more secure data, triggering a user.deleted webhook to avoid retaining unnecessary user information. user.deleted Learn more about secure user state management flow → Learn more about secure user state management flow → Learn more about secure user state management flow → Learn more about secure user state management flow → Learn more about secure user state management flow → More featured content More featured content More featured content More featured content SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks SCIM provisioning tutorial for Node.js appsPassport.js migration guideThe Developer’s Guide to SSO (updated)SFTP integrations vs. native APIs for user provisioningUnderstanding CSRF attacks SCIM provisioning tutorial for Node.js apps SCIM provisioning tutorial for Node.js apps Passport.js migration guide Passport.js migration guide The Developer’s Guide to SSO (updated) The Developer’s Guide to SSO SFTP integrations vs. native APIs for user provisioning SFTP integrations vs. native APIs for user provisioning Understanding CSRF attacks Understanding CSRF attacks Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSSeptember Product Newsletter99.99% Uptime Guarantee | Events API | Audit Logs Retention Period API | SCIM Group Membership Fragmentation WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS September 2023 Product Newsletter 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS September 2023 Product Newsletter September 2023 Product Newsletter September 2023 Product Newsletter 99.99% Uptime Guarantee 99.99% Uptime Guarantee 99.99% Uptime Guarantee 99.99% Uptime Guarantee We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). We are now providing 99.99% availability for all customers using SSO, Directory Sync, and Audit Logs. Enterprise customers in particular will benefit from the contractually guaranteed uptime as specified in the Service Level Agreement (SLA). Learn more about the uptime improvement → Learn more about the uptime improvement → Learn more about the uptime improvement → Learn more about the uptime improvement → Learn more about the uptime improvement → Events API Events API Events API Events API Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Events are actions that occur within WorkOS, identity, and directory providers. The Events API allows your app to interface with WorkOS and retrieve events more securely and efficiently. Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Learn more about the Events API → Audit Logs Retention Period API Audit Logs Retention Period API Audit Logs Retention Period API Audit Logs Retention Period API Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Audit Log retention periods for an organization can now be set via the Audit Logs API. By default, logs are retained for 30 days. Customers interested in offering Audit Log retention periods for longer, as part of an enterprise package for example, can extend the period to 365 days with an API call. Learn more about the Audit Logs retention period API → Learn more about the Audit Logs retention period API → Learn more about the Audit Logs retention period API → Learn more about the Audit Logs retention period API → Learn more about the Audit Logs retention period API → Consolidating Group Membership Fragmentation in Directory Sync Consolidating Group Membership Fragmentation in Directory Sync Consolidating Group Membership Fragmentation in Directory Sync Consolidating Group Membership Fragmentation in Directory Sync Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Identity providers implement the SCIM protocol differently, leading to potential vulnerabilities. WorkOS now mitigates this with a standardized, security-first approach to handling group membership events like deactivation, suspension, and reactivation. All users that are updated to “suspended” state will now result in a deletion of that user’s group memberships. Learn more about consolidating group membership fragmentation in Directory Sync → Learn more about consolidating group membership fragmentation in Directory Sync → Learn more about consolidating group membership fragmentation in Directory Sync → Learn more about consolidating group membership fragmentation in Directory Sync → Learn more about consolidating group membership fragmentation in Directory Sync → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSAugust Product Newsletter!Read a recap of exciting releases and important updates and to the WorkOS platform WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS WorkOS August 2023 Product Newsletter August 2023 Product Newsletter August 2023 Product Newsletter August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. August was filled with exciting releases. As we continue to innovate and improve our platform, we’ll be sharing a recap of important updates at the end of every month. Audit Logs Event Schema API Audit Logs Event Schema API Audit Logs Event Schema API Audit Logs Event Schema API Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Define Audit Logs event schema in code. While you can still define event schema in the WorkOS Dashboard, the Event Schema API provides more automation and reduces friction when integrating and adding new event types. Learn more about Audit Logs Event Schema API → Learn more about Audit Logs Event Schema API → Learn more about Audit Logs Event Schema API → Learn more about Audit Logs Event Schema API → Learn more about Audit Logs Event Schema API → Directory events view Directory events view Directory events view Directory events view You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. You can now view directory events from the WorkOS Dashboard. Investigate events in an organization’s directory with more granularity by applying filters such as date ranges and metadata. Navigate to an organization’s directory page to view the directory events tab. Learn more about directory events view → Learn more about directory events view → Learn more about directory events view → Learn more about directory events view → Learn more about directory events view → Log Streams destination: Google Cloud Storage Log Streams destination: Google Cloud Storage Log Streams destination: Google Cloud Storage Log Streams destination: Google Cloud Storage Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Google Cloud Storage, along with Datadog, Splunk, and AWS S3, is now supported as a Log Streams destination. Stream Audit Logs directly from your application to an organization's Google Cloud instance. Admins can also configure Log Streams in the WorkOS Admin Portal. Learn more about Google Cloud Storage Log Streams destination → Learn more about Google Cloud Storage Log Streams destination → Learn more about Google Cloud Storage Log Streams destination → Learn more about Google Cloud Storage Log Streams destination → Learn more about Google Cloud Storage Log Streams destination → Admin Portal invite via email Admin Portal invite via email Admin Portal invite via email Admin Portal invite via email Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Streamline an organization’s onboarding by inviting the IT admin directly to the WorkOS Admin Portal via secure email invites. Learn more about the Admin Portal invite via email → Learn more about the Admin Portal invite via email → Learn more about the Admin Portal invite via email → Learn more about the Admin Portal invite via email → Learn more about the Admin Portal invite via email → SCIM setup validation flow SCIM setup validation flow SCIM setup validation flow SCIM setup validation flow Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Leverage extra validation steps that have been added for new SCIM directories prior to activation. Provide the organization’s IT admin with more confidence in the connection and its data integrity. These steps ensure essential data reception including accurate email attribute transmission, before IT admins proceed to finalize setup in the Admin Portal. Learn more about the validation flow during SCIM setup → Learn more about the validation flow during SCIM setup → Learn more about the validation flow during SCIM setup → Learn more about the validation flow during SCIM setup → Learn more about the validation flow during SCIM setup → Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104
WorkOSInterested in a WorkOS demo?With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails548 Market St, PMB 86125 • San Francisco, CA 94104 Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Unsubscribe from all WorkOS marketing emails Hi Joe, Hi Joe, Hi Joe, We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. We’re sure you’re busy on your core product, so we would love to help move your WorkOS integration forward however we can. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. With WorkOS, setting up SSO can take less than an hour, and our team is here to help. Schedule a 30 minute chat for a demo, help integrating, or to answer any questions you might have. less than an hour Schedule a 30 minute chat Talk soon,WorkOS Talk soon,WorkOS Talk soon,WorkOS P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! P.S.—Have you seen our Developer’s Guide to SSO? It’s a great place to learn the lingo of SSO and best practices from engineers who have been there before! Developer’s Guide to SSO Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe from all WorkOS marketing emails Unsubscribe 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104 548 Market St, PMB 86125 • San Francisco, CA 94104