English
  • logto
  • recap

Logto 2025: scaling and trust

The best year yet for Logto. A recap of what we shipped, why enterprises chose Private Cloud, what we learned about reliability, and what’s next in 2026.

Gao
Gao
Founder

Stop wasting weeks on user auth
Launch secure apps faster with Logto. Integrate user auth in minutes, and focus on your core product.
Get started
Product screenshot

2025 was the year Logto got a lot bigger:

  • Logto Cloud grew ~10x in MRR year over year
  • Identities in Logto Cloud grew from under 1M to 2M+
  • Logto OSS gained 2,000+ GitHub stars

We also served more enterprise customers, kept SOC 2 Type II current, improved GDPR-related work, and shipped a lot across authentication and authorization.

More of our growth came from larger customers with stricter requirements around data residency and isolation, so we leaned heavily on Private Cloud there.

Private Cloud: why enterprises picked it

For enterprise teams, features are table stakes. The real decision is about the “boring” requirements: isolation, data residency, performance, security review, and reliability.

Logto Private Cloud exists for that:

  • data residency options that match compliance requirements
  • infrastructure-as-code and flexible cloud setup, making rollouts smooth and scalable

Example: for one European organization, we deployed two Private Cloud instances in about a week. Each is sized for 1,000+ RPS with headroom.

What we shipped

We aim to keep changes practical and aligned with OIDC and OAuth. A few highlights:

Open source

Logto OSS gained 2,000+ stars in 2025, plus amazing community work like custom password hashing support and new connectors.

Open source is how most people find Logto, test it, and decide whether to trust it. We’re not changing that.

MCP and agent auth

We started MCP Auth work to support AI and agentic workflows. As more software becomes agent-driven, identity and authorization need to keep up. More on this in 2026.

Reliability: what changed for us

In 2025, we saw fewer incidents caused by regressions. Most issues came from upstream dependencies or cloud infrastructure.

That’s not an excuse to say it wasn’t on us. The biggest gap wasn’t the fix, it was speed and clarity of updates. We’re tightening that up.

2026 priorities

  • reliability, incident communication, and operational maturity
  • making Logto the default choice for modern multi-tenant SaaS where security and UX both matter
  • pushing forward on MCP and agentic auth

If you’re building a SaaS or AI product and need modern auth that scales, Logto is built for it.