Guides

Guides and Resources

What is a SAML ACS URL and how do I use it?

What’s a SAML ACS URL, and why do you keep getting asked for one when setting up SSO? This guide explains what it is, how it works, and how to use it.

Ned O'LearyNed O'Leary
Guides and Resources

Unphishable MFA explained: what unphishable MFA is and how to use it

Learn what unphishable MFA is and why it matters. (Hint: phishing is a big, big problem!)

Ned O'LearyNed O'Leary
Guides and Resources

Token entropy explained: what is token entropy?

What is token entropy, and why does it matter for security? This is a maximally simple, minimally technical primer for developers.

Ned O'LearyNed O'Leary
Guides and Resources

AuthN vs. AuthZ: What's the difference between authentication and authorization?

What's the difference between authentication and authorization? I'll break down AuthN vs. AuthZ in simple terms. I'll cover what they mean, how they work, and why they matter for SaaS apps.

Ned O'LearyNed O'Leary
Guides and Resources

API Key Management Service: What It Is, Why It Matters, and How to Choose One

Looking for an API key management service? This guide breaks down what these tools do, why they matter, and how to choose the right one—with real product recommendations.

Ned O'LearyNed O'Leary
Guides and Resources

JIT provisioning: what is JIT provisioning in SaaS authentication?

JIT provisioning creates user accounts automatically at first login via SSO. It's a fast, secure way to onboard users in SaaS apps.

Ned O'LearyNed O'Leary
Guides and Resources

Open source auth providers in 2025: best solutions for open source auth in SaaS

A comparison of the best open source authentication providers in 2025 — including Keycloak, Authentik, Ory, and Tesseral. Ideal for developers building secure auth on open source foundations.

Ned O'LearyNed O'Leary
Guides and Resources

SaaS User Management: Tips and Best Practices

User management in SaaS is more than just login—it’s about access, security, and control. This guide covers key practices like roles, permissions, and audit logs to help you scale safely.

Ned O'LearyNed O'Leary
Guides and Resources

Deprovisioning: what does "deprovisioning" mean in business software?

When we talk about "deprovisioning" in business software, we generally mean that we're removing a user's access to an application or deleting a user's account. Notably, we usually handle deprovisioning programmatically over the SCIM protocol.

Ned O'LearyNed O'Leary
Guides and Resources

Next.js authentication: ways to implement authentication in Next.js

If you're wondering how you'll implement auth in Next.js, here are some of the major options you should consider, including both open source tools and proprietary commercial services.

Ned O'LearyNed O'Leary
Guides and Resources

Magic links in authentication: what are they?

Magic links actually aren't magic. They're just a user-friendly authentication factor. I'll cover what they are, what they're for, and how you can set them up.

Ned O'LearyNed O'Leary
Guides and Resources

Keycloak alternative: Tesseral is open source auth for B2B SaaS

We often hear from people that have used Keycloak in the past -- or are currently using Keycloak -- that have started to look for an alternative. Tesseral may be a good fit!

Ned O'LearyNed O'Leary
Guides and Resources

SAML vs. SCIM: What's the Difference?

Identity gets confusing. There are a lot of opaque acronyms to navigate. Here, I'll explain the difference between SAML and SCIM as simply as I can.

Ned O'LearyNed O'Leary
Guides and Resources

Auth0 for Startups: Tesseral is an Open Source Alternative

Auth0 is a good solution for some companies. Tesseral may be a more suitable open source alternative for many startups.

Ned O'LearyNed O'Leary
Guides and Resources

Identity Provider vs. Service Provider: What's the Difference?

Authentication protocols like SAML get really confusing. Here, I try to explain in minimally technical terms the difference between an identity provider (IDP) and a service provider (SP).

Ned O'LearyNed O'Leary
Guides and Resources

SSO vs. OAuth: What's the Difference?

There's a lot of confusing jargon in the world of auth. Here's a quick, minimally technical rundown of the difference between SSO and OAuth.

Ned O'LearyNed O'Leary
Guides and Resources

Auth0 Private Cloud: Tesseral is an Open Source Alternative

While you can technically use Auth0's 'Private Cloud' service, it's really a lot easier just to go with something open source!

Ned O'LearyNed O'Leary
Guides and Resources

How should my early stage B2B SaaS handle auth?

Every SaaS app needs auth. If you're unsure how to approach auth for your SaaS, this article might help guide your decisions.

Ned O'LearyNed O'Leary
guides-and-resources

What’s the Difference Between SAML and OIDC?

SAML vs. OIDC explained simply for developers and non-developers alike

Megan O'LearyMegan O'Leary
Resources
Compare
Company
Social