Guides Overview¶
Our comprehensive guides will help you implement and optimize Root Security features in your applications. Choose a topic to get started:
Authentication¶
Learn how to implement secure authentication flows:
- Getting Started with Authentication
- User Management
- Single Sign-On (SSO)
- Multi-factor Authentication (MFA)
Authorization¶
Implement fine-grained access control:
Security¶
Best practices and compliance guidance:
Use Cases¶
Common implementation scenarios:
- Securing a SaaS Application
- Protecting APIs and Microservices
- Customer Identity and Access Management (CIAM)
- Enterprise Single Sign-On