Learn how to build smart productivity apps (e.g., AI agent) that integrate with Google APIs using Logto Secret Vault for secure access and refresh token storage, incremental authorization, and seamless OIDC/OAuth 2.0 integration.
Learn how to use Bolt.new to build a full-stack app with Logto authentication. From configuring sign-in flows to creating a floating login panel and enabling social logins, this guide covers both setup and customization.
Supabase offers fast backend setup for AI startups, but lacks robust authentication and authorization. Learn how pairing it with Logto creates a scalable, production-ready stack.
A detailed comparison of top AI coding agents like Cursor, GitHub Copilot, Windsurf, Bolt.new, and Replit. This article breaks down their key features, strengths, and ideal use cases to help developers choose the right tool for their workflow.
Learn how does modern CAPTCHA works. Compare Google reCAPTCHA, Cloudflare Turnstiles, and more providers from features, pricing, and integration tips.
Lovable is an AI-powered coding agent that helps you build full-stack apps using natural language: frontend, backend, database, and deployment, all in one place. With the support for Logto, you can now add secure login, user management, and auth flows effortlessly.
Learn how to vibe code a photo gallery app using Cursor and add login with Logto in minutes. From UI to authentication, it’s fast, simple, and AI-powered.
Provides key implementation points for MCP server authentication compliance with the 2025-06-18 specification.
This article covers how Manus manages login sessions in its cloud browser, the security risks of agent-based authentication, and alternatives like OAuth and credential vaults.
Learn to implement magic links for passwordless sign-in, invitation-only registration, and organization member invites using one-time tokens.
Master IAM security threats, essential features, and modern best practices. Discover how Logto’s developer-first IAM platform implements secure authN and authZ.
Global e-commerce brings complex identity challenges. Managing identity is now key to growth, security, and compliance. This article covers essentials like SSO, multi-identifier sign-ups, MFA, and CAPTCHA.
As AI agents become more capable and connected, building secure and scalable agentic products requires a strong foundation in authentication and identity. This guide breaks down what’s changed, what hasn’t, and what every builder needs to know to navigate the new landscape.
Looking for an auth provider? Logto lets you choose between a managed SaaS (SOC2/HIPAA compliant, instant scaling) or a self-hosted open-source solution. Free trial & easy migration.
MCP Auth gives you everything you need to add production-ready auth to your MCP server. No weeks spent reading specs or wiring things up.
We’re deeply grateful to have you on this journey. Join us in celebrating Logto’s milestone achievements!
Learn what disposable emails are, why they exist, the risks they pose to applications, and the key strategies you can use to detect and block them for stronger security and cleaner user data.
Explores the key elements of an effective IAM solution including user experience, security, integration capabilities, documentation, cost-effectiveness, support, and future readiness based on Logto's experience serving developers.
Demonstrates how to leverage Logto's 3rd-party app feature to integrate Apache Answer, creating a unified community platform where users can seamlessly access support using their existing accounts.
Logto Cloud now supports a new region in Japan, offering low-latency access and local data residency compliance for users in the Asia-Pacific region.
Learn why OAuth 2.0 and OpenID Connect (OIDC) are important for modern authentication, especially in the age of AI, agents, and smart devices. This article covers key use cases, when to implement these protocols, and how to choose the right auth provider for scalability and security.
This article introduces A2A and MCP — two emerging protocols shaping the future of AI agent systems. It explains how they work, how they differ, and why understanding this architecture matters for developers, designers, and AI product builders.
Explore how to implement local HTTPS in your development workflow with tools like Mkcert and step-by-step guides for Express.js and Next.js.
This blog post will guide you through the fundamental steps to implement RTL (Right-to-left) language support in your web application effectively.
Let's take a closer look at the redirect URI as it is a critical security component in OIDC authentication process.
Learn how to use Logto for user authentication in your Encore backend application. In this guide we show you how to integrate your Go backend with Logto.
Learn how to empower your business by securely connecting AI tools to your existing services using Personal Access Tokens and Model Context Protocol (MCP), with complete source code and practical examples.
This article provides an overview and breaks down the key details of Firebase Authentication. It covers what Firebase Auth is, a summary of its pricing, and the best alternatives to Firebase Auth.
In this piece, we explore the latest AI breakthroughs that underscore the urgency of secure agent and MCP integration. We highlight OAuth-based authentication as an important measure for protecting user credentials and explain how Logto can help your product serve as both an MCP server and an identity provider in the rapidly growing AI ecosystem.
This article is created by Logto, an open-source solution that helps developers implement secure...