Blog
News, insights and more
Learn more about Clerk, our approach to authentication, and company news.
![](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2F_blog%2Fopusflow%2F2983e8e39c57dc70da1be06f78dcf0578631215c-2400x1260.png&w=3840&q=75)
Seamless Integration: How Clerk Streamlined OpusFlow's User Authentication
Learn how Clerk's user-friendly authentication system streamlined OpusFlow's SaaS integration, enhancing productivity and performance.
- Published
![](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2F_blog%2Fpasswordless-authentication%2Fea448229cf785d95c8a45bd60ddbf93d61cbeb20-1200x630.png&w=3840&q=75)
Passwordless Authentication: Which Option Is Right for Your App
Passwordless Authentication is on an upward trajectory thanks to advancements in this space and recent password breaches.
- Published
![](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2F_blog%2Fwhat-are-webhooks%2F4a4cbce367f422c2722c02edfe250824b299cfc6-1200x630.png&w=3840&q=75)
What are Webhooks? The Ultimate Guide
Webhooks allow apps to communicate with one another. Find out best practices and more here.
- Published
What are Webhooks? The Ultimate Guide
- Category
- Insights
- Published
- Authors
What Is an SDK and How Is It Different From APIs?
- Category
- Insights
- Published
- Authors
User Management and How It Relates to Authentication
- Category
- Insights
- Published
- Authors
What is Next.js?
- Category
- Insights
- Published
- Authors
Authentication vs. Authorization: What's the Difference?
- Category
- Insights
- Published
- Authors
The New Wave Stack
- Category
- Insights
- Published
- Authors
The future of authentication is both stateful and stateless
- Category
- Insights
- Published
- Authors
Just-in-time API requests are replacing webhooks
- Category
- Insights
- Published
- Authors
How to compete and WIN in a software economy [Part 2]
- Category
- Insights
- Published
- Authors
How to compete and WIN in a software economy [Part 1]
- Category
- Insights
- Published
- Authors
The Ultimate Guide To JSON Web Tokens (JWTs) and Token-Based Authentication
- Category
- Insights
- Published
- Authors