Engineering

blog-image
Auth & identity
Engineering
June 28, 2024
Webhooks security best practices
blog-image
Auth & identity
Engineering
January 12, 2024
How to securely implement M2M authentication and authorization in Node.js using Stytch
blog-image
Company
Engineering
December 29, 2023
Apply by API: Making job applications developer-focused
blog-image
Auth & identity
Engineering
December 26, 2023
The complete guide to machine-to-machine (M2M) authentication and authorization
blog-image
Engineering
December 21, 2023
Optimizing DBs at scale: how we reduced writes by 1000x for one of our most accessed tables
blog-image
Engineering
Product
December 5, 2023
Log in with Passkeys: an example app using React and Stytch’s frontend SDK
blog-image
Engineering
October 20, 2023
Upleveling our SQL models to manage DBT query speeds
blog-image
Engineering
September 1, 2023
Open-sourcing SQX, a way to build flexible database models in Go
blog-image
Engineering
July 18, 2023
Generating "humanlike" code for our backend SDKs
blog-image
Engineering
July 12, 2023
What does compiler theory have to do with auth?
blog-image
Engineering
July 10, 2023
An engineer’s guide to mobile biometrics: Android Keystore pitfalls and best practices
blog-image
Engineering
May 3, 2023
An engineer's guide to mobile biometrics: event- vs result-based
blog-image
Engineering
May 3, 2023
An engineer's guide to mobile biometrics: step-by-step
blog-image
Engineering
March 17, 2023
Stytch postmortem 2023-02-23
blog-image
Auth & identity
Engineering
January 20, 2023
Choosing a B2B auth provider
blog-image
Auth & identity
Engineering
January 10, 2023
What is Security Assertion Markup Language (SAML) and how does it work?
blog-image
Auth & identity
Engineering
December 16, 2022
What is OpenID Connect (OIDC)?
blog-image
Auth & identity
Engineering
December 9, 2022
SSO protocols: SAML vs. OIDC
blog-image
Company
Engineering
December 3, 2022
Engineering the engineering team
blog-image
Auth & identity
Engineering
November 22, 2022
What is single sign on (SSO) and how does it work?
blog-image
Auth & identity
Engineering
November 17, 2022
Organization tenancy: the foundation of SSO and B2B data models
blog-image
Engineering
November 16, 2022
The remote dev decision: part one
blog-image
Auth & identity
Engineering
November 4, 2022
Introducing B2B Auth School
blog-image
Engineering
November 9, 2021
Building an app with Stytch and PlanetScale
blog-image
Engineering
October 4, 2021
The ultimate guide to building user authentication into your Next.js application
blog-image
Company
Engineering
July 22, 2021
A founder's guide to hiring engineers