TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Comparing Auth from Supabase, Firebase, Auth.js, Ory, Clerk and Others

6 pointsby osenerabout 2 years ago

1 comment

kiwicoppleabout 2 years ago
(supabase ceo)<p>looks like this is a repost, so I&#x27;ll copy my comment from last week: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=34834322" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=34834322</a><p>----<p>this is a great write up. Some responses to your red flags:<p>No setting for session lifetime - as you point out, there is a setting called &quot;JWT expiry limit&quot;. I&#x27;ll mention this to the Auth team and see if they want to consider changing the name of the setting<p>Client-side unencrypted tokens - we give developers options. Serverside auth is definitely more secure, but that&#x27;s not always an option (eg, on React). If you have a serverside requirement, you can check out our Auth Helpers [0] which give you several patterns for serverside auth.<p>No 2FA on their own platform - we just released this to the Auth server in December[1]. It&#x27;s on it&#x27;s way for the platform.<p>This comment caught my eye: &quot;It also creates the ultimate vendor lock-in&quot;. That&#x27;s surprising! You can pg_dump all your entire database, including your users. I can assure you that&#x27;s easier than other Auth platforms.<p>With that said, I want to let you know that this is all fair feedback. We _definitely_ care about Auth - it&#x27;s one of our most important products. We have a dedicated Auth team who are fixing issues based on user feedback, as fast as possible. We receive a flood of feedback across a lot of channels, and we do our best to keep up. From an product perspective, we aim to deliver products that makes sense in a Postgres context - you can see that we think deeply about how this service fits with Row Level Security in our MFA post below.<p>Your article has a lot of actionable insights, which I&#x27;ll go through with the team to continue this improvement.<p>[0] Auth Helpers: <a href="https:&#x2F;&#x2F;supabase.com&#x2F;docs&#x2F;guides&#x2F;auth&#x2F;auth-helpers">https:&#x2F;&#x2F;supabase.com&#x2F;docs&#x2F;guides&#x2F;auth&#x2F;auth-helpers</a><p>[1] MFA: <a href="https:&#x2F;&#x2F;supabase.com&#x2F;blog&#x2F;mfa-auth-via-rls">https:&#x2F;&#x2F;supabase.com&#x2F;blog&#x2F;mfa-auth-via-rls</a>
评论 #34862359 未加载