background

The better identity infrastructure for developers

Every app needs authentication and authorization. Logto is an open-source Auth0 alternative designed for modern apps and SaaS products.

Next.js logoReact logoGo logoVue logoAngular logoAndroid logo

Trusted by over 10,000 customers worldwide

Build your project with the identity and access management solution that developers love.

For all app builders

Whether you are building a consumer app, SaaS, or enterprise product, Logto has you covered.

Email and SMS passwordless

Using one-time codes sent via email and SMS to ensure a secure and friendly sign-in experience.

Social sign-in

Using social sign-in to let users log in using their existing social media accounts such as Facebook, Apple, Google, etc.

Password

Using password sign-in to serve as the most popular method of authentication for your products and unblock users.

Omni sign-in experience

Secure user authentication across apps and platforms with unified experience and Single Sign-On. Customize your sign-in experience for a beautiful, seamless sign-in.

Multi-factor authentication

Stay ahead in the cybersecurity game and attract security-conscious clients by integrating multi-factor authentication into your product.

Enterprise SSO (SAML & OIDC)

Easily meet your enterprise identity system needs with our SSO solution. It offers secure connections to various identity providers via SAML or OIDC protocols.

Organizations (multi-tenancy)

In multi-tenant and B2B apps, leveraging organizations is a preferred way to group users and resources. Use Logto organizations features to drive SaaS best practices.

Identity provider for third-party apps

Turn your service into an innovation hub with Logto. Build an ecosystem around your product and let third-party apps use your identity system.

Machine-to-machine authentication

Use machine-to-machine (M2M) authentication to protect communication between apps, microservices, monoliths, and IoT devices.

Machine-to-machine authentication

Role-based access control

Design your authorization policy and manage user access with Logto role-based access control. Available for both global and organization resources.

Impersonation

Allows authorized users to temporarily act on behalf of others. This is especially helpful for troubleshooting, customer support, and administrative tasks.

Impersonation

Personal access token

Securely allow users to grant access without needing credentials or interactive sign-ins. They’re ideal for CI/CD, scripts, or applications that require programmatic access to resources.

Personal access token

Simplify development with 20+ modern frameworks and Logto Management API

Grow and scale, with trust and security

Integrate Logto

Set up Logto in minutes and start building your app

Idea and proof of concept

Use Logto to quickly build and test your ideas

A single app

Secure your app with Logto and focus on your core business

Multi-app structure

Easily manage multiple apps at scale with Logto

Sell to enterprises

Get enterprise-ready with Logto features and support

Secure your identities at all lifecycle stages of your product

  • Any company stage
  • Any business model
  • Any product infrastructure

Whether you're evolving as a multi-product business, just starting businesses selling to individuals, or planning to expand to large enterprise clients, Logto can help quickly implement those must-have features around your product's identities.

Trust and security

SOC 2 logo

SOC 2 compliant

Logto has undergone the AICPA SOC 2 Type I certification to validate Security, Availability, and Confidentiality controls. With a Type II audit on the horizon, we aim to further demonstrate our commitment to security and compliance.

  • Open-source
  • Self-hosting assurance
  • Role-Level Security
  • Argon2 algorithm
  • High availability
Protection
  • Community-driven
  • Data protection
  • TLS encryption
  • Data isolation
  • Database encryption

Logto Cloud is hosted in the EU 🇪🇺 , Australia 🇦🇺 and US 🇺🇸 regions and provides robust security with stringent protocol adherence, DevSecOps practices, advanced encryption, and measures for data isolation and protection.

Learn more about trust and security

Why Logto?

9,000+
Stars
433,000+
Downloads
1,000+
Members
100+
Countries

The most scalable and flexible product

  • OIDC-based product and covers authentication and authorization.
  • Logto is designed to scale with your business, from a single app to multi-app structure.

Reasonable cost and high ROI

  • Logto’s pay-as-you-go and add-on pricing means predictable costs, no surprising bills for MAUs.
  • Logto’s enterprise plan can be customized to meet your business needs.

Help businesses grow and innovate

  • We prioritize developers and startups underserved by large corporations.
  • Logto offers plenty of tutorials, videos, and SDKs for smooth integration with the latest apps and frameworks.

Open-source and community-driven

  • Logto boasts a strong open-source version that is highly regarded within the developer community.
  • Enjoy complete freedom with no vendor lock-in, backed by robust security.

Easily manage your identities with Logto