TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How is everyone managing user authentication for their platform?

8 pointsby aisha_mc10 months ago
I am thinking of using only SMS based authentication for my SaaS. Any suggestions?

15 comments

Too10 months ago
It really depends on who the service is being sold to.<p>Business - SSO via Oauth2, with Azure AD as a ready to use integration<p>Developers - SSO via Oauth2, with prepared integrations for Github, Gitlab, Keycloak, Okta, or Google.<p>Personal banking or services where a tie to your real identity is an absolute must - SSO through your national id provider.<p>Personal sites with less stringent security - SSO with Google or Apple. Here you may also roll your own identity with user+pass+2fa. I guess this is the category you are interested in based on your suggestion. This is also the category with most variety in the field, for example some sites allow email login and recently passcodes are getting popular here.
评论 #41178142 未加载
wishpal9 months ago
Currently we use passport.js (<a href="https:&#x2F;&#x2F;www.passportjs.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passportjs.org&#x2F;</a>) and it gives all basic authentication - SSO, email etc. we found OKTA expensive, have used it before.
Ramiro9 months ago
I&#x27;d highly discourage you from using SMS; it&#x27;s very insecure. I&#x27;d go as far as to recommend you not to implement your own auth and instead use something like Auth0, WorkOS, SuperToken, or SSOReady (<a href="https:&#x2F;&#x2F;github.com&#x2F;ssoready&#x2F;ssoready">https:&#x2F;&#x2F;github.com&#x2F;ssoready&#x2F;ssoready</a>), among others.<p>Building auth stacks is not trivial and is not what will make your SaaS successful. The more you can leverage experts to focus on what makes your SaaS special, the better.
kevinold10 months ago
Regarding SMS only auth, you should be cautious. Here&#x27;s a blog with more detail: <a href="https:&#x2F;&#x2F;stytch.com&#x2F;blog&#x2F;totp-vs-sms" rel="nofollow">https:&#x2F;&#x2F;stytch.com&#x2F;blog&#x2F;totp-vs-sms</a>.<p>As a suggestion for what to implement (I&#x27;m biased because I work there) but I&#x27;d encourage you to check out Stytch (<a href="https:&#x2F;&#x2F;stytch.com" rel="nofollow">https:&#x2F;&#x2F;stytch.com</a>). We&#x27;re an API-first authentication, authorization and fraud prevention B2C and B2B solution with several methods including email&#x2F;password, email magic links, social logins and 2FA (OTP, TOTP).
romanhn10 months ago
I&#x27;m using Firebase Auth for my side project. Pretty easy to get started and has generous free limits. I went with Google Auth and passwordless email links. SMS auth would start getting expensive very quick, especially with international users.
评论 #41179410 未加载
gtirloni10 months ago
Definitely NOT with SMS.<p><a href="https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2020&#x2F;10&#x2F;sms-authentication&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2020&#x2F;10&#x2F;sms-authentication&#x2F;</a>
Harsh18210 months ago
&quot;it really depends!!&quot; on the level of security required for the data&#x2F;actions that seat behind the authentication - for e.g. for Banking and Financial services - a 2factor auth is a must.<p>For average usage, mobile based auth is ok - although in that case you are relying on the security infrastructure of telecom operator, which in many country is not that good - e.g. identity theft to hijack someone mobile number is quite common.
评论 #41168854 未加载
leros10 months ago
Don&#x27;t do anything unusual like SMS. It becomes a friction point where you&#x27;ll lose people. Email&#x2F;password, Google auth, and maybe another social depending on your product space is what people are used to.
gabriel_dev10 months ago
I stick to Django User + custom secret link via email for my pet project. No need to remember any password or 3rd party auth flow.
th3w3bmast3r9 months ago
We use authentication provided by Laravel Passport. Has been working great for us.
purple-leafy10 months ago
Just enter a username and I’ll give you full access
throwaway21110 months ago
Depends what you need.<p>From just the headline I thought the question was slightly different however: JWT with requires time, UA, IP and some decay of variance of these customisable via an integer value from 0 to 100. Let the user choose?<p>LOL.<p>No device fingerprinting via JS or any 3rd party as I believe in users&#x27; liberty.<p>So, how the user gets the above JWT:<p>Is any authentication needed?<p>Is they want to opt in, how&#x27;s a trip code?<p>An account name recoverable via email. Or secret. Or SMS. Or remembering last account action? Or a combination?<p>For a sensitive action, what&#x27;s the tradeoff between verification and convenience? Against what sort of actor?<p>SMS is exclusionary. Which works if you want to exclude non US&#x2F;EU phone dependent users and target those that care little about security or privacy.
andrewmcwatters10 months ago
scrypt, totp<p>My firm doesn’t offer SMS to clients unless they explicitly ask for it now.
I_am_tiberius10 months ago
node.js - oidc-provider library with passport.js.
MultifokalHirn10 months ago
SAP