Logto blog

Discover Logto and explore plenty of resources on authentication, authorization, identity management, open standards (OAuth, OpenID Connect, SAML), and more.

All posts

  • Cover
    Simplify API authentication with personal access token: A more secure API token
  • Cover
    What is impersonation in cybersecurity and identity management? How can AI agents use it?
  • Cover
    Logto is now SOC 2 Type II compliant!
  • Cover
    Simplify SAML app integration for developers
  • Cover
    2025 Amazon Cognito's latest pricing explained and the best Amazon Cognito alternatives
  • Cover
    What is B2B SaaS, and what will the post-SaaS era (2025+) with AI look like?
  • Cover
    What is refresh token rotation and why is it important?
  • Cover
    Logto plan update: Optimizing token quotas to protect Logto from abuse and ensure reliability
  • Cover
    Understanding access tokens, refresh tokens, and ID tokens in OpenID Connect (OIDC) protocol
  • Cover
    2025 Auth0's latest pricing explained and the best Auth0 alternatives
  • Cover
    OTP bots: What they are and how to prevent attacks
  • Cover
    What is an authenticator app
  • Cover
    Why you might see a 404 when signing in to your Logto-integrated app
  • Cover
    Real use cases: Expanding your auth system with webhooks
  • Cover
    Enterprise SSO: What it is, how it works, and why it matters
  • Cover
    Set up authentication and maximize Google login conversions with 6 configurations
  • Cover
    5 go-to-market lessons I learned from driving a developer-led growth product
  • Cover
    Logto add-on pricing: A simple explanation
  • Cover
    Color palette in branding: How Logto generate a custom color scheme for your brand
  • Cover
    Is magic link sign-in dying? A closer look at its declining popularity