Skip to content

Commit 4ccfdf1

Browse files
author
mostafamoqbelibrahim
committed
resolved conflicts
2 parents 5696365 + a8a77cd commit 4ccfdf1

File tree

34 files changed

+4468
-170
lines changed

34 files changed

+4468
-170
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Please refer to the [CONTRIBUTING.md](https://github.com/supertokens/blog/blob/m
1212

1313
## Contact us
1414

15-
For any queries, or support requests, please email us at team@supertokens.com, or join our [Discord](https://www.supertokens.com/discord) server.
15+
For any queries, or support requests, please email us at support@supertokens.com, or join our [Discord](https://www.supertokens.com/discord) server.
1616

1717
## Authors
1818

83.9 KB
Loading
909 KB
Loading
311 KB
Loading

content/add-mfa-to-nextjs/index.md

Lines changed: 168 additions & 0 deletions
Large diffs are not rendered by default.

content/all-you-need-to-know-about-user-session-security/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ Man in the middle (MITM) attacks are possible in the following scenarios.
214214
2. When using a Proxy: </br> Two of the last three organizations I worked at, monitored all the traffic on their network. At workplaces, devices likely use the corporate wifi network. Companies can enable the connected devices to trust their network proxy as an SSL Certificate Authority as a prerequisite to connect to the wifi. This would enable them (or a malicious actor) to see auth token information during transmission.
215215

216216
**Methods of prevention:**</br>
217-
The easiest way to protect against this type of attack is to use https and secure cookies throughout your application. However, this doesn’t prevent attacks that result from the use of a proxy. One could take extra precaution by using public/private keys that are fixed per device. The frontend and backend would exchange these public keys at the point of initialization (before the user logs in). For subsequent communication, the token data could be encrypted using the public keys. This limits transit attacks to only the initial public key exchange. There is a modification that would enable the prevention of replay attacks but that is not covered in this blog post. (Feel free to [reach out](mailto:team@supertokens.com) if you would like to know more). Regardless, some of the described flows (flow 5 and the proposed flow in [Part 2](/blog/the-best-way-to-securely-manage-user-sessions)) aim to minimize exposure of the critical token by reducing its frequency of transit.
217+
The easiest way to protect against this type of attack is to use https and secure cookies throughout your application. However, this doesn’t prevent attacks that result from the use of a proxy. One could take extra precaution by using public/private keys that are fixed per device. The frontend and backend would exchange these public keys at the point of initialization (before the user logs in). For subsequent communication, the token data could be encrypted using the public keys. This limits transit attacks to only the initial public key exchange. There is a modification that would enable the prevention of replay attacks but that is not covered in this blog post. (Feel free to [reach out](mailto:support@supertokens.com) if you would like to know more). Regardless, some of the described flows (flow 5 and the proposed flow in [Part 2](/blog/the-best-way-to-securely-manage-user-sessions)) aim to minimize exposure of the critical token by reducing its frequency of transit.
218218

219219
### OAuth token theft
220220

content/express-session-vs-supertokens-for-handling-user-sessions/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ It’s clear that if using express-session, it’s very likely that an organisat
195195

196196
## Conclusion:
197197

198-
We can see that SuperTokens clearly wins out on the metrics we have chosen. Not just that, it’s only going to get much better over time as we expand on the number of frameworks we support as well as add more amazing features! Overall, it is much more secure and complete. Of course, I am a little biased towards SuperTokens because I am one of the contributors to the library, but I think I have compared the two libraries fairly. If you find that there are some metrics I have missed where Express-session performs better, or if you have any general feedback, please drop a comment or send us an [email](mailto:team@supertokens.com).
198+
We can see that SuperTokens clearly wins out on the metrics we have chosen. Not just that, it’s only going to get much better over time as we expand on the number of frameworks we support as well as add more amazing features! Overall, it is much more secure and complete. Of course, I am a little biased towards SuperTokens because I am one of the contributors to the library, but I think I have compared the two libraries fairly. If you find that there are some metrics I have missed where Express-session performs better, or if you have any general feedback, please drop a comment or send us an [email](mailto:support@supertokens.com).
199199

200200
To learn more about Sessions, please visit our other blogs and our website:
201201

Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
---
2+
title: "SuperTokens Launch Week 02: 7 Open-Source Auth Plugins"
3+
date: "2025-10-10"
4+
description: "Open-source auth plugins you’ll reuse: profiling, banning, CAPTCHA, tenancy tools, and telemetry. React/Node ready. "
5+
cover: "launch-week-02-open-source-auth-plugins.png"
6+
category: "programming"
7+
author: "Darko Bozhinovski"
8+
---
9+
10+
11+
We just wrapped up **SuperTokens Launch Week 02** — five days of shipping new tools to solve some of the most common and time-consuming problems in authentication.
12+
13+
The vision is simple: a world where you can run a single command and have auth just work, regardless of your stack. This week was a step in that direction.
14+
15+
If you missed it, here’s a full breakdown.
16+
17+
---
18+
19+
## The Problem: You Keep Building the Same Things Over and Over
20+
21+
Authentication isn’t just about logging in. It’s often about managing the entire user lifecycle — profile pages, moderation tools, bot protection, and routing logic for multi-tenant apps.
22+
23+
These are solved problems, yet we find ourselves rebuilding them for almost every new project. It’s repetitive, distracting, and keeps you from focusing on your core product.
24+
We want to eliminate that waste.
25+
26+
---
27+
28+
## The Solution: A New Set of SuperTokens Plugins
29+
30+
This week, we expanded beyond core authentication to deliver an ecosystem of **easy-to-use, open-source plugins**. Each one tackles a problem developers face repeatedly.
31+
32+
Here’s what we shipped:
33+
34+
---
35+
36+
### 🧩 Day 1: The Profile Family of Plugins
37+
38+
Stop building user profile pages from scratch.
39+
This plugin family gives you a ready-to-go, customizable profile page and a **progressive profiling system** to gather user info over time without overwhelming them at sign-up.
40+
41+
**Check them out here:**
42+
- [Progressive Profiling](https://supertokens.com/docs/post-authentication/user-management/progressive-profiling)
43+
44+
---
45+
46+
### 🤖 Day 2: The Captcha Plugin
47+
48+
Spambots are a constant headache.
49+
Our **Captcha plugin** makes it trivial to add **hCaptcha**, **reCAPTCHA**, or another provider to your SuperTokens forms — just configure and go.
50+
51+
**Check them out here:**
52+
- [Captcha Plugin](https://supertokens.com/docs/additional-verification/captcha)
53+
54+
---
55+
56+
### 🚫 Day 3: The User Banning Plugin
57+
58+
Every community needs moderation.
59+
This plugin lets you **ban bad actors instantly** — no custom moderation code required.
60+
61+
**Check them out here:**
62+
- [User Banning](https://supertokens.com/docs/post-authentication/user-management/user-banning)
63+
64+
---
65+
66+
### 🏢 Day 4: The Tenant Management Family of Plugins
67+
68+
For SaaS and B2B apps, multi-tenancy is often messy.
69+
We shipped two plugins to simplify it:
70+
71+
- **Tenant Discovery:** Handles routing users to the right tenant automatically.
72+
- **Tenant Self-Management:** Makes tenant setup and maintenance far easier.
73+
74+
**Check them out here:**
75+
- [Tenant Discovery](https://supertokens.com/docs/authentication/enterprise/tenant-discovery)
76+
77+
---
78+
79+
### 🔍 Day 5: The OpenTelemetry Plugin
80+
81+
Finally, we brought **deep observability** to your auth layer.
82+
Our **OpenTelemetry plugin** gives you a behind-the-scenes look at the SuperTokens SDK — allowing you to **trace flows, monitor performance, and debug issues with precision**.
83+
84+
**Check it out here:**
85+
- [OpenTelemetry Plugin](https://supertokens.com/docs/deployment/telemetry)
86+
87+
---
88+
89+
## Why This Matters
90+
91+
Authentication should be a solved problem.
92+
Our goal is to bring **SuperTokens to your stack**, not force your stack to bend around us. These plugins abstract away the boilerplate so you can focus on building what makes your product unique.
93+
94+
This is just the beginning.
95+
We’re already working on the next wave of plugins — and we can’t wait to see what you build with them.
96+
97+
---
98+
99+
Thanks for following along with our first Launch Week.
100+
We can’t wait to see what you build.

0 commit comments

Comments
 (0)