IT Manager at a manufacturing company with 10,001+ employees
Real User
Top 20
Apr 9, 2026
Auth0 Platform is the main identity provider at my company for different brands, serving as a gateway to downstream systems. Each brand uses Auth0 Platform for authentication and authorization purposes, with different services and functionalities downstream where each system is secured by a JWT token signed by the Auth0 tenant, making Auth0 Platform serve as the identity protection layer and authentication and authorization protocol. Auth0 serves as an attack protection layer, security and access control, automation and onboarding layer.
Software Engineer at a financial services firm with 51-200 employees
Real User
Top 10
Apr 8, 2026
My main use case for Auth0 Platform is sign up and storing users' information. On our platforms, if we need users to sign up or log in, we use Auth0 Platform implementation with Next.js. It makes the user flow easy to use. If a user wants to use their social sign-in, password, or username and password, we can use the multiple platforms, making the whole process seamless. It is easier than implementing it ourselves. We outsource it to Auth0 Platform, and Auth0 Platform makes the process easier to use. On the platform, because we tailor certain services to certain users, we implement Auth0 Platform with our database. When the users come on the platform, their details are saved. That also eases the stress of having to manually write users' data. All their sessions and their login processes, everything is saved to the database straightforwardly with the use of Auth0 Platform. That also helps us to implement an easy user flow, so we can manipulate the database easily instead of writing from scratch. It helps us with our database work and makes that process easy and seamless. I can give a quick, specific example of how Auth0 Platform has helped me in a real scenario. On our platform, we need users to sign in to use our services. If we wanted to create a social sign-in from scratch, we would have to set up our Google Cloud console, our GitHub console, and we would have to set up Facebook, Google, and other providers. We would have to get each different token and set it up. With Auth0 Platform, it eases that process. If I want to implement multiple sign-in processes with Auth0 Platform, I just need to set up my Auth0 Platform account, and it makes the process easy. If I wasn't using Auth0 Platform, I would have to create it from scratch and set up five different sign-up processes, which would take a lot of time. Auth0 Platform saves us that time so fast and so quick.
I have been using Auth0 Platform for more than a year for authorizations, login, and sign-up functionality in my application for my current project. My main use case for Auth0 Platform involves registering all existing users to Auth0 and onboarding new companies and users, which all feed into Auth0. When I need to update any organizational units, such as the name or trading name, I use Auth0. If I need to change the MFA for any existing user or to check roles and permissions granted to a particular user, I use Auth0. As a software engineer, I do not use Auth0 that often; I work with the basic, generic flow which I have already mentioned. The developers in my company would use Auth0 on a day-to-day basis. I have used it to handle login, signups, and user identities, so it is a nice tool to work with.
Auth0 Platform serves as our primary authentication platform for public-facing websites, and we use it primarily for two-factor authentication. We only use Auth0 Platform for user authentication and do not use it for API-based authentication. We currently use Auth0 Platform to secure three applications, and our next phase is introducing multi-tenancy.
Associate Software Engineer at a computer software company with 201-500 employees
Real User
Top 10
Mar 13, 2026
I am using Auth0 Platform to implement security in the applications that I build. I build applications for myself or for customers, so Auth0 Platform usually provides security authentication to the users of those applications. Whatever application in whichever language I have built, I can use Auth0 Platform's security for that application because it is easy to implement since they have already built the SDKs and related tools for particular languages. In whichever language my application is, I can use that SDK because they were already pre-built. Using that means that my application development time and the time to implement security for my application will be less. I scheduled a call to provide a review on Auth0 Platform. Auth0 Platform is very easy to use and very intuitive in nature. For developers, it is mainly a great platform to implement the security framework in their applications because they have already built some previously. It is easy to use that instead of building from scratch in my application. The customizations for the end user, such as the domain or the interface which the user is directly facing, can be customized with Auth0 Platform. The hooks, all these actions, and all triggers are parts which I liked more in Auth0 Platform. I can serve almost every category because whichever application I have built can use Auth0 Platform since it supports all web applications, mobile applications, API services, back-end services, and all of this. I can use Auth0 Platform for any sector that has been built with web applications or mobile applications.
Auth0 Platform's main use case is to serve as an identity provider for all the applications that users want to access. This enables achieving single sign-on, multi-factor authentication, migrating users, and keeping them stored safely. Auth0 Platform secures external API calls during the authentication flow through a feature called Action Secrets. When you write custom Node.js code to extend the login process via Auth0 Actions, you use Action Secrets to securely store and inject API tokens or sensitive credentials so they are not exposed to potential attackers.
Senior Manager And Vice President at a tech vendor with 10,001+ employees
Real User
Top 10
Feb 27, 2026
I work with Okta, and I also work with SailPoint, Veza, and IBM tools because I am overseeing many sales engagements, and I must deal with many tools. We are a service company, and we offer different kinds of products to our clients. For example, there is an enterprise customer XYZ Corporation using Microsoft Azure AD as an IDP, who logs into a multi-tenant HR application through an Auth0 tenant managing connections, RBAC, and tokens. The user visits the HR application and logs in with their email, Auth0 redirects them to Azure AD for authentication, which sends tokens back to Auth0, allowing the user to access the HR app with the roles assigned. Working on Veza at this stage includes preparation for migrating systems; I will begin this process in the coming months after thorough research and planning.
Senior Software Engineer at Charter Communications
Real User
Top 20
Dec 3, 2025
My main use case for Auth0 is for authentication purposes for my APIs. I rely on it mainly to give specific access to a specific enterprise or user depending on their eligibility. I use Auth0 to authenticate our enterprise customers before giving them access to a set of APIs where we show them the data or billing information, anything that they want and we can offer. Everything goes through Auth0.
I am a reseller, and our customers primarily use Auth0 ( /products/auth0-reviews ) for B2B purposes. Auth0 ( /products/auth0-reviews ) is mainly used for their employees.
Full Stack PHP/Python AWS Developer at Binary Port
Real User
Top 5
Oct 30, 2024
We use the solution for API security and management. We implement our solution with almost ten to fifteen vendors' APIs, like Salesforce and HubSpot. It involves generating leads, invites, adding contacts, and opportunities, mostly challenging with Salesforce integration due to limited documentation.
Director Cloud Software Development at a manufacturing company with 201-500 employees
Real User
Top 10
Sep 4, 2024
We have user management, role management, and tenant concepts for multi-tenant applications. We use organizations in Auth0. For Okta, we mostly use it for internal SSO to provision users to internal tools.
Developers use the solution to build log-in and sign-up experiences. Auth0 provides an API key that is integrated with the code. We provide sign-in and sign-up instead of making our sign-up, sign-in, invite-user, and forgot-password. We buy Auth0 and integrate it; they run it on their cloud.
Our initial use case was authentication. We didn't want to implement anything from scratch, so we needed an out-of-the-box solution. That's why we chose Auth0. Right now, it's deployed on-premises for our development environment and on cloud. The cloud provider is AWS. We're in the beginning stages of a project, so only 10 people are currently using this solution in my organization.
Solutions Architect at a tech vendor with 10,001+ employees
Real User
Nov 8, 2022
We use this solution for authentication and authorization, and we deploy it on cloud. For example, if you log into a particular portal, this platform will help authenticate a valid user. It supports identity federation, FSO and multi-tenancy.
Principal Architect at a computer software company with 201-500 employees
MSP
Aug 29, 2021
We are building a software as a service platform of products, and we wanted our customers to be able to have the same seamless experience in terms of how they log into our products. We wanted it to be secure, and we didn't want to use our own development resources in building our own solution. We wanted something that is secure and ready at the beginning of our development so that we have a very short time to market. We wanted it to be a very extensible solution and building something on our own wasn't an option for us. We wanted something that was already there. We also wanted a company that is highly committed to delivering state-of-the-art solutions for identity management. It is deployed in the cloud. This is a software as a service. So, our workloads work in the cloud. We are mostly using AWS, but we also have Azure and GCP. We are a multi-cloud company.
We were evaluating Auth0 as centralized authentication solution for our in-house development. We are searching for the best solution to take care of this because our product development is ongoing, and we want to find just the right fit. Ultimately, we did not choose Auth0.
Security Architect at a construction company with 10,001+ employees
Real User
Nov 14, 2019
I'm a security architect. The product is used by our customers, not by our company people directly, so I expect we would have several thousand people using this solution.
Auth0 Platform utilizes JWT-based authentication and supports over 30 social logins, enabling integration with various codebases. Known for robust security, compliance, and scalability, it's tailored for enterprises needing customizable, efficient authentication solutions.Auth0 Platform is a comprehensive identity management system used for customer, business-to-business, and API authentication across cloud infrastructures like AWS, Azure, and GCP. It simplifies user logins and identity...
Auth0 Platform is the main identity provider at my company for different brands, serving as a gateway to downstream systems. Each brand uses Auth0 Platform for authentication and authorization purposes, with different services and functionalities downstream where each system is secured by a JWT token signed by the Auth0 tenant, making Auth0 Platform serve as the identity protection layer and authentication and authorization protocol. Auth0 serves as an attack protection layer, security and access control, automation and onboarding layer.
My main use case for Auth0 Platform is sign up and storing users' information. On our platforms, if we need users to sign up or log in, we use Auth0 Platform implementation with Next.js. It makes the user flow easy to use. If a user wants to use their social sign-in, password, or username and password, we can use the multiple platforms, making the whole process seamless. It is easier than implementing it ourselves. We outsource it to Auth0 Platform, and Auth0 Platform makes the process easier to use. On the platform, because we tailor certain services to certain users, we implement Auth0 Platform with our database. When the users come on the platform, their details are saved. That also eases the stress of having to manually write users' data. All their sessions and their login processes, everything is saved to the database straightforwardly with the use of Auth0 Platform. That also helps us to implement an easy user flow, so we can manipulate the database easily instead of writing from scratch. It helps us with our database work and makes that process easy and seamless. I can give a quick, specific example of how Auth0 Platform has helped me in a real scenario. On our platform, we need users to sign in to use our services. If we wanted to create a social sign-in from scratch, we would have to set up our Google Cloud console, our GitHub console, and we would have to set up Facebook, Google, and other providers. We would have to get each different token and set it up. With Auth0 Platform, it eases that process. If I want to implement multiple sign-in processes with Auth0 Platform, I just need to set up my Auth0 Platform account, and it makes the process easy. If I wasn't using Auth0 Platform, I would have to create it from scratch and set up five different sign-up processes, which would take a lot of time. Auth0 Platform saves us that time so fast and so quick.
I have been using Auth0 Platform for more than a year for authorizations, login, and sign-up functionality in my application for my current project. My main use case for Auth0 Platform involves registering all existing users to Auth0 and onboarding new companies and users, which all feed into Auth0. When I need to update any organizational units, such as the name or trading name, I use Auth0. If I need to change the MFA for any existing user or to check roles and permissions granted to a particular user, I use Auth0. As a software engineer, I do not use Auth0 that often; I work with the basic, generic flow which I have already mentioned. The developers in my company would use Auth0 on a day-to-day basis. I have used it to handle login, signups, and user identities, so it is a nice tool to work with.
Auth0 Platform serves as our primary authentication platform for public-facing websites, and we use it primarily for two-factor authentication. We only use Auth0 Platform for user authentication and do not use it for API-based authentication. We currently use Auth0 Platform to secure three applications, and our next phase is introducing multi-tenancy.
I am using Auth0 Platform to implement security in the applications that I build. I build applications for myself or for customers, so Auth0 Platform usually provides security authentication to the users of those applications. Whatever application in whichever language I have built, I can use Auth0 Platform's security for that application because it is easy to implement since they have already built the SDKs and related tools for particular languages. In whichever language my application is, I can use that SDK because they were already pre-built. Using that means that my application development time and the time to implement security for my application will be less. I scheduled a call to provide a review on Auth0 Platform. Auth0 Platform is very easy to use and very intuitive in nature. For developers, it is mainly a great platform to implement the security framework in their applications because they have already built some previously. It is easy to use that instead of building from scratch in my application. The customizations for the end user, such as the domain or the interface which the user is directly facing, can be customized with Auth0 Platform. The hooks, all these actions, and all triggers are parts which I liked more in Auth0 Platform. I can serve almost every category because whichever application I have built can use Auth0 Platform since it supports all web applications, mobile applications, API services, back-end services, and all of this. I can use Auth0 Platform for any sector that has been built with web applications or mobile applications.
Auth0 Platform's main use case is to serve as an identity provider for all the applications that users want to access. This enables achieving single sign-on, multi-factor authentication, migrating users, and keeping them stored safely. Auth0 Platform secures external API calls during the authentication flow through a feature called Action Secrets. When you write custom Node.js code to extend the login process via Auth0 Actions, you use Action Secrets to securely store and inject API tokens or sensitive credentials so they are not exposed to potential attackers.
I work with Okta, and I also work with SailPoint, Veza, and IBM tools because I am overseeing many sales engagements, and I must deal with many tools. We are a service company, and we offer different kinds of products to our clients. For example, there is an enterprise customer XYZ Corporation using Microsoft Azure AD as an IDP, who logs into a multi-tenant HR application through an Auth0 tenant managing connections, RBAC, and tokens. The user visits the HR application and logs in with their email, Auth0 redirects them to Azure AD for authentication, which sends tokens back to Auth0, allowing the user to access the HR app with the roles assigned. Working on Veza at this stage includes preparation for migrating systems; I will begin this process in the coming months after thorough research and planning.
My main use case for Auth0 is for authentication purposes for my APIs. I rely on it mainly to give specific access to a specific enterprise or user depending on their eligibility. I use Auth0 to authenticate our enterprise customers before giving them access to a set of APIs where we show them the data or billing information, anything that they want and we can offer. Everything goes through Auth0.
I am a reseller, and our customers primarily use Auth0 ( /products/auth0-reviews ) for B2B purposes. Auth0 ( /products/auth0-reviews ) is mainly used for their employees.
We use the solution for API security and management. We implement our solution with almost ten to fifteen vendors' APIs, like Salesforce and HubSpot. It involves generating leads, invites, adding contacts, and opportunities, mostly challenging with Salesforce integration due to limited documentation.
We have user management, role management, and tenant concepts for multi-tenant applications. We use organizations in Auth0. For Okta, we mostly use it for internal SSO to provision users to internal tools.
Developers use the solution to build log-in and sign-up experiences. Auth0 provides an API key that is integrated with the code. We provide sign-in and sign-up instead of making our sign-up, sign-in, invite-user, and forgot-password. We buy Auth0 and integrate it; they run it on their cloud.
We use the tool for Single Sign-On (SSO) feature.
Our initial use case was authentication. We didn't want to implement anything from scratch, so we needed an out-of-the-box solution. That's why we chose Auth0. Right now, it's deployed on-premises for our development environment and on cloud. The cloud provider is AWS. We're in the beginning stages of a project, so only 10 people are currently using this solution in my organization.
We use this solution for authentication and authorization, and we deploy it on cloud. For example, if you log into a particular portal, this platform will help authenticate a valid user. It supports identity federation, FSO and multi-tenancy.
We use it as an authentication platform for our customers.
We are building a software as a service platform of products, and we wanted our customers to be able to have the same seamless experience in terms of how they log into our products. We wanted it to be secure, and we didn't want to use our own development resources in building our own solution. We wanted something that is secure and ready at the beginning of our development so that we have a very short time to market. We wanted it to be a very extensible solution and building something on our own wasn't an option for us. We wanted something that was already there. We also wanted a company that is highly committed to delivering state-of-the-art solutions for identity management. It is deployed in the cloud. This is a software as a service. So, our workloads work in the cloud. We are mostly using AWS, but we also have Azure and GCP. We are a multi-cloud company.
The primary use case of this solution is to authenticate APIs, customer authentication, and business-to-business authentication.
We were evaluating Auth0 as centralized authentication solution for our in-house development. We are searching for the best solution to take care of this because our product development is ongoing, and we want to find just the right fit. Ultimately, we did not choose Auth0.
I'm a security architect. The product is used by our customers, not by our company people directly, so I expect we would have several thousand people using this solution.