Resources to help you get the most out of Kinde
Types and methods
Types and methods overview
Unsure which type of authentication is right for your platform? Discover everything you need to know about authentication types and methods.
Curious about exploring the benefits of passwordless authentication? Discover how passwordless works and how it stacks up to multi-factor authentication.
Curious about how passwordless authentication with magic links works? Discover how the security of email can streamline your user experience.
Thinking about using single sign-on in your app or company? Discover what you need to know about SSO authentication.
Wondering if Active Directory Federation Service (ADFS) is the right SSO solution for you? Discover why many businesses are moving away from this approach.
Thinking about elevating your app or platform’s security? Discover how multi-factor authentication (MFA) can safeguard your systems.
JSON Web Tokens
Interested in learning more about JSON Web Tokens? From JWT structure to how they work, we reveal everything you need to know about this open standard.
Are you using access tokens but looking to strengthen your platform security? Discover how refresh tokens can balance user experience with data protection and security.
SP vs IdP
Not sure about how SP-initiated SSO differs from IdP-initiated SSO? Discover what you need to know about these different approaches to SSO.
JSON Web Key Sets
Want to learn how JSON Web Key Sets can boost the security of your app or platform? Here’s what you need to know.
Curious about how JSON Web Token Claims work? Dive into the important elements of JWT Claims and the role they play in app security.
Curious about how token-based authentication works? Discover the different types of token-based authentication and the benefits of these methods.
Trying to pick the right authentication protocol for your app, platform or team? Discover the most common types of authentication protocols and which one could be best for you.
Curious about how SAML authentication works? Dive into our comprehensive guide for everything you need to know about SAML.
Interested in how OAuth 2.0 works? Discover everything you need to know about the OAuth 2.0 authorization framework.
OAuth 2.0 flows
Ready to learn how OAuth 2.0 flows work? Discover the key types of OAuth flows and how to pick the right flow for your app.
OAuth 2.0 grant types
Unsure about which OAuth grant type is right for your platform? Discover what you need to know about picking the right OAuth grant type.
Open ID Connect
Curious about how the Open ID Connect protocol works? Discover the benefits of OIDC and how it works for apps and developers.
Wondering how Kerberos authentication works and whether it's right for your company? Dive into everything you need to know about this authentication protocol.
Are you considering using Lightweight Directory Access Protocol (LDAP) in your company? Discover how this protocol works and its benefits.
Want to learn how Customer Identity and Access Management works? Discover the benefits of CIAM and how it compares to IAM.
Authentication vs Authorization
Curious about the difference between authentication and authorization? Discover the key differences between authentication and authorization in this complete guide.
Interested in SaaS user management? Discover everything you need to know about user management for SaaS tools and what solutions you can leverage.
Role-Based Access Control
Are you curious about how Role-Based Access Control works? Discover everything you need to know about RBAC and user permissions.
Attribute-Based Access Control
Unsure if attribute-based access control is right for your company? Discover how ABAC stacks up against RBAC.
Are you harnessing the power of SCIM Provisioning? Find out how the System for Cross-Domain Identity Management works and its benefits.
Roles and permissions
Want to learn how user roles and permissions work in access management? Discover how to set your company up for success.
OTP vs HOTP vs TOTP
Curious about the difference between OTP, HOTP and TOTP? We dive into what each type of one-time password means and which could be best for your use case.
Looking to level up the security of your password storage? Learn how Bcrypt hashing can help you balance security and usability.
Thinking about using Hash-Based Message Authentication Codes? Here’s what you need to know about using this message authentication method.
Stay in the loop!
Hear from us about product updates, news and cool things in the startup ecosystem.