Passwordless auth for modern B2B apps

Support passkeys, social login, magic links, OTP and SSO through one identity layer, without fragmenting users, sessions, or organization

One OIDC integration for all the login flows you need

All methods resolve into the same user, organization, and session model. You can add or remove login methods over time without reworking your auth layer

Login methods reimagined for the passwordless era

Frictionless B2B auth without legacy passwords, built for enterprise security and multi-tenant access

Upgrade to Passkeys

Add passkeys as a secure phishing-resistant login alternative while keeping magic links, OTP and social logins fully supported
Enable on top of existing connection, no-rewrite
Hosted Passkey management screen included
Compatible with org provisioning rules and RBAC

Boost conversion with social logins

Let users sign in with Google, GitHub, or Slack and more.
Users get a single, de-duplicated account across providers
All social providers supported
Automatic identity linking via email verification
Org memberships and roles persist across logins

Enable low-friction magic links & OTPs

Offer magic links, OTPs, or both. Expiry, resend logic, and session creation are handled uniformly in production
Configurable expiry and resend rules
Optional same-browser enforcement
Works with hosted or custom email delivery

Enterprise SSO, unified with your entire auth stack

Add SAML and OIDC SSO alongside your existing auth system, with self-serve setup and automatic certificate rotation for any enterprise IdP

Ship hosted login and sign-up on your domain, fully branded

Customize every detail of your hosted login page to match your brand, from logos and layout to backgrounds and behavior

All the B2B essentials to ship, debug, and audit auth in production

Shared users across orgs
One user identity across multiple organizations with seamless context switching and no duplicated accounts
Authentication
logs
Full visibility into logins, sessions, and org-level auth events with timestamps and context for debugging and audits
Role-based access control
Define roles and permissions once, then enforce access consistently across orgs and auth methods
Customizable interceptors
Inject custom logic into sign-up, login, and session flows to enforce business or security rules

Pick the auth method you need, skip the heavy lifting

Go live in days. Scale with confidence.
Start Free
$0
/ month
1 million Monthly Active Users
100 Monthly Active Organizations
1 SSO connection
1 SCIM connection
10K Connected Accounts
Unlimited Dev & Prod environments