Introduction
Getting started
Authalla is a multi-tenant authentication platform that provides passwordless sign-in with passkeys and magic links, enterprise SSO, social login, and full OAuth2/OIDC compliance — so you can ship secure authentication without building it yourself.
Installation
Create an OAuth2 client, configure redirect URIs, and start OAuth2 flows.
Authentication overview
Understand Authalla authentication flows, tokens, and session lifecycle.
Branding & theming
Match the login experience to your product.
What is Authalla?
Authalla is an OAuth2 and OpenID Connect authentication provider designed for modern applications. It handles user authentication, session management, and identity federation so your team can focus on building your product.
Key capabilities include:
- Passwordless authentication — passkeys (WebAuthn/FIDO2), magic links, and PIN codes. No passwords to store, steal, or reset.
- Enterprise SSO — OIDC-based Single Sign-On with Microsoft Entra ID, Okta, Google Workspace, and other identity providers. Unlimited connections at flat monthly pricing.
- Social login — Google, GitHub, Apple, and Microsoft sign-in with one-click setup.
- Multi-tenancy — one account can manage multiple tenants, each with isolated user pools, branding, and custom domains.
- OAuth 2.1 compliant — authorization code flow with PKCE, refresh tokens, and standard scopes.
- SCIM provisioning — automated user lifecycle management for enterprise customers.
- Developer tools — CLI, MCP server for AI assistants, and admin dashboard for managing everything.
Every feature is included in every plan with no per-connection fees for SSO or SCIM.
Quick start
Register an account at authalla.com, then pick the path that suits you best.
Set up with AI (recommended)
Connect Authalla's MCP server to your AI assistant and let it handle the setup for you — creating OAuth2 clients, configuring redirect URIs, branding, custom domains, and more.
Claude Code:
claude mcp add authalla https://login.authalla.com/mcp
Claude Desktop, VS Code, Cursor — add the MCP server URL in settings:
https://login.authalla.com/mcp
Once connected, just tell your assistant what you need:
> Create an OAuth2 client for my Next.js app on localhost:3000
> Set up a custom domain auth.example.com
> Configure Google social login
See MCP server for full setup instructions.
Set up manually
- Create an OAuth2 client in the Admin Dashboard — a default tenant is already set up for new accounts.
- Add redirect URIs on the client and configure allowed origins in Tenants → (select tenant) → API.
- Integrate with your app — redirect users to the Authalla authorization endpoint with PKCE:
https://{tenant-id}.authalla.com/oauth2/authorize
?response_type=code
&client_id=your_client_id
&redirect_uri=https://app.example.com/oauth/callback
&scope=openid profile email
&code_challenge=...
&code_challenge_method=S256
- Exchange the authorization code for tokens at
/oauth2/token.
For a detailed walkthrough, see Installation.
Common tasks
- Enable passkeys and magic link fallback for passwordless authentication.
- Configure enterprise SSO connections with Microsoft Entra ID, Okta, or Google Workspace.
- Set up social login with Google, GitHub, Apple, or Microsoft.
- Customize the hosted login UI with your brand colors and logo.
- Add a custom domain like
auth.yourdomain.com. - Connect AI assistants to manage your tenant via the MCP server.
Getting help
Need help? Email is the best way to reach us: [email protected].