Consumer Authentication powered by Stytch

A comprehensive identity platform that makes it easy to build authentication into any stack or code base, so you can tailor it to fit your unique requirements and end user experience. We give you options for how to integrate — directly with our APIs, leveraging our frontend or backend SDKs, or using our out-of-the-box pre-built components.

Multiple ways to integrate

key

Backend API and SDKs

For maximum composability, flexibility, and code control. Our backend API and SDKs in Go, Python, Ruby, Node and Kotlin/Java integrate tightly with your application's backend services with fine-grained, high-touch interfaces. Build auth exactly the way you need to.
key

Frontend and mobile SDKs

For building and managing your auth client-side. Our frontend and mobile SDKs enable you to wire custom UI to communicate directly with Stytch's API. Develop in JavaScript, ReactNative, iOS, and Android.
key

Pre-built UI

A complete out-of-the-box experience. Our frontend JavaScript SDK also offers pre-built UI with customizable login and signup forms. Configure your preferred auth methods. Customize the look and feel. Get started in minutes.

About Consumer Authentication

Consumer Authentication

As your application grows, it becomes critical for your authentication to be frictionless, secure, and flexible in order to scale your product, boost conversion, and provide a great user experience. Suited for social media, e-commerce, fintech, healthcare, Web3, and other industries, Stytch's Consumer Auth platform offers a wide variety of authentication methods and integrations that can be tailored to your requirements.

Designed to be composable, backend-driven, and future-proof, Stytch lets you build seamless auth experiences your end users will love, with tools your engineering team will thank you for.


Consumer Authentication features

Stytch offers developers a comprehensive set of features and capabilities in order to build secure and scalable Consumer Authentication. This includes but is not limited to:

  • Auth methods: Stytch's Consumer Auth paltform offers a robust product suite with a wide variety of options so you can customize the auth experience in any way you need. Choose any combination of auth methods like Email Magic Links, Embeddable Magic Links, Passwords, OAuth, OTP, TOTP, Mobile Biometrics, Passkeys, WebAuthn, and Web3.

  • Passwordless: Stytch showcases a variety of passwordless auth that are proven to reduce friction and boost conversion for your end users. Passwordless auth methods include Magic Links, OAuth, OTP, TOTP, Mobile Biometrics, Passkeys, WebAuthn, and Web3.

  • User management: Stytch's Consumer Auth platform treats Users as first-class entities. Stytch stores and manages authenticated User records, which are enriched with auth metadata and custom metadata that you define. Don't want to deal with handling your users' PII? Offload your user management onto Stytch's secure services and fetch the data when you need it.

  • Sessions: Stytch mints, stores, and validates Sessions on behalf of your application. After an end user successfully authenticates, Stytch's API will return both a session_token and a session_jwt for you to choose from. Use Stytch's Sessions to validate requests, authorize actions, and store metadata.

  • Account deduplication: Stytch automatically deduplicates Users -- even if they log in with different auth methods. If an end user who created an account with a password tries to log in the next time with Google OAuth, we automatically and safely merge those accounts on your behalf.

  • Account takeover safeguards: Stytch's API employs safeguards to protect you against an exhaustive list of attack vectors like credential stuffing, account enumeration, and other account takeover threats. For example, many hackers will try to hijack a legitimate user’s account by creating many accounts with fake passwords and the known email addresses of their victims in order to squat on these accounts and take advantage of apps that don’t practice safe account de-duplication. When Stytch deduplicates accounts, we force a password reset and invalidate any other login methods to make sure only the true owner of the user’s email can get into the account. Another example, user information updates such as new phone numbers and email addresses can sometimes accidentally expose an account takeover vulnerability. At Stytch, we require additional authentication to make sure this doesn’t happen, keeping your developers and users secure.

  • Multi-factor authentication: Stytch's composable API and SDKs enable you to build MFA flows for a more secure login experience. Use auth methods like SMS OTP, Email OTP, TOTP, or WebAuthn, as secondary factors on top of more traditional primary auth factors like Passwords.

  • Step-up authentication: Stytch's composable API and SDKs also enable you to trigger step-up authentication flows when end users are performing sensitive actions like editing usernames, updating payment info, or changing security questions. Implement step-up auth to provide an extra layer of protection based on specific app activity.

  • Provider failover: Stytch handles the delivery of email, SMS, and Whatsapp messages on your behalf for auth methods such as Magic Links, OTP, and Password resets. Integrating with these delivery providers, for email and SMS, can be both a huge expense and a maintenance challenge for engineering teams. At Stytch, we not only take care of the delivery for you but also provide automatic failover contingencies; if an email or SMS provider goes down, we'll instantly switch you over to another provider -- without any disruption to your application.

  • Custom HTML email templates: Stytch also supports custom HTML email templates. Write your own copy, and build emails with your own HTML and CSS to customize the look and feel. Build a template for every auth flow: signup, login, invite, password reset, and verify.

  • Event logs: Stytch provides you with developer tools like Event Logs to help you debug and observe the behavior of your auth implementations. Investigate the details of any Stytch API call. Perform real-time search over the last thirty days worth of data.