Skip to content

Guides Overview

Our comprehensive guides will help you implement and optimize Root Security features in your applications. Choose a topic to get started:

Authentication

Learn how to implement secure authentication flows:

Authorization

Implement fine-grained access control:

Security

Best practices and compliance guidance:

Use Cases

Common implementation scenarios:

  • Securing a SaaS Application
  • Protecting APIs and Microservices
  • Customer Identity and Access Management (CIAM)
  • Enterprise Single Sign-On