Let's show you how to automate the deployment of your custom sign-in UI to Logto Cloud in your devops...
Lessons and practices learned in driving Logto’s growth with developers. Logto is an open-source,...
Understand the differences between opaque tokens and JWTs, their use cases, and how they are...
Explore why simply following conventional commits isn't enough to write good commit messages, and...
A comprehensive guide on the pros and cons of using JWTs for authentication, with emphasis on auth...
This tutorial will guide you through the process of creating and deploying your own custom sign-in UI...
How audiences perceive a brand is strongly influenced by color psychology. By using a carefully...
A guide to create a remark plugin to make the reading time data available when importing MDX files as...
When we open a particular URL in the browser, how does the browser load and display the content? We...
Dive deep into the world of Base64 encoding. Learn its history, how it works, when to use it, and its...
We've migrated our three frontend projects from Parcel to Vite, and the process was... smooth. ...
Magic link sign-in is a convenient and secure way to authenticate users. However, its popularity has...
Learn the differences between Personal Access Tokens (PATs), Machine-to-Machine (M2M) authentication,...
Learn how to enhance the user sign-up experience with Logto authentication parameters. At Logto,...
React.lazy is a great way to load components on demand and improve the performance of your app....
Debunking the "POST only" API myth, explaining why it stems from a misunderstanding of API design...
This article will compare webhooks vs. polling, analyze the advantages and disadvantages of each...
Slash authentication setup time to under one hour with Logto! With no-code integration, a free...
Explore how Demonstrating Proof of Possession (DPoP) enhances the security of OpenID Connect (OIDC)...
Learn how to use Postman to obtain a machine-to-machine access token and call Logto management API in...
Sometimes your GitHub Actions workflow is moody and fails for random reasons. Let's see how you can...
Role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most...
Just-in-Time provisioning is a process used in identity and access management systems to create user...
We will introduct GraphQL in this article and compare it with REST API. Have you ever worked on...
Discuss the reasons why you should consider PostgreSQL over MongoDB for your next project. ...
Learn how to create a custom SDK for Logto using @logto/node. Previously in this article, we...
Single sign-on (SSO) is a great way to simplify the authentication model and improve the user...
Learn how to create a custom social connector for Logto in just a few steps. ...
Since the initial release of OAuth 2.0, the internet has evolved significantly. Security threats have...
In this article, we will reemphasize the definition of the Logto Management API, explain how it...