Today's Deep-Dive: SuperTokens
Ep. 387

Today's Deep-Dive: SuperTokens

Episode description

In this episode, we take a deep dive into SuperTokens, an open-source authentication platform built to help developers and organizations regain control over one of the most critical layers of modern software: user identity. Starting with the headaches of building authentication from scratch or relying on expensive proprietary vendors like Auth0, AWS Cognito, and Firebase, we explore how SuperTokens offers a different path through self-hosting, modular architecture, and full ownership of user data.

Along the way, we unpack how the system works under the hood, from front-end and back-end SDKs to the standalone core service that handles cryptographic security, session management, and database operations. We also look at why the project chose Java for its core, how it achieves performance through local token verification, and what features it brings out of the box, including passwordless login, social sign-in, MFA, SSO, multi-tenancy, plugins, and seamless user migration from legacy auth providers. More than a technical walkthrough, this episode is about data sovereignty, escaping vendor lock-in, and what it means to truly hold the master key to your own digital identity system.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

[SPEAKER_00] So before we jump into today's deep dive, I really want to mention the supporter of today's show safe server.

0:06

[SPEAKER_00] Because, well, if you're building software right now, you know, the landscape is utterly dominated by these really expensive proprietary tools.

0:15

[SPEAKER_01] Right, things like Auth or AWS Cognito, Google Firebase.

0:20

[SPEAKER_00] Exactly.

0:20

[SPEAKER_00] And Safe Server is entirely focused on replacing those costly black boxes with open source solutions.

0:28

[SPEAKER_00] I mean, when you look at the long-term scaling costs, the financial difference of switching away from big vendors is absolutely staggering.

0:35

[SPEAKER_01] Yeah.

0:35

[SPEAKER_01] And there's also a massive compliance angle here too, right?

0:38

[SPEAKER_01] Because authentication isn't just about logging in.

0:41

[SPEAKER_01] You are handling passwords, personal emails, session tokens.

0:45

[SPEAKER_01] And depending on your industry, you might be facing incredibly strict legal and regulatory requirements around like data protection or financial records, audit trails.

0:53

[SPEAKER_00] Which is exactly where data sovereignty comes in.

0:56

[SPEAKER_00] Because if your user's data lives on, say, an AWS server in a jurisdiction you don't control, you don't really control the data.

1:02

[SPEAKER_00] No, not at all.

1:03

[SPEAKER_00] So Safe Server helps organizations, whether you're a startup, a business, or an association, find and implement the right open source authentication solutions.

1:12

[SPEAKER_00] They guide you from the initial consulting strategy all the way to operating the software on secure servers located right in the EU.

1:18

[SPEAKER_01] That's a huge deal for Peace of Mind.

1:20

[SPEAKER_00] It really is.

1:21

[SPEAKER_00] You can explore how they can help your organization at www.safeserver.de.

1:29

[SPEAKER_00] So, welcome to today's Deep Dive, everyone.

1:32

[SPEAKER_00] Our mission today is to give you a really beginner-friendly, under-the-hood look at a tool to try to decentralize digital identity.

1:39

[SPEAKER_00] It's called SuperTokens.

1:40

[SPEAKER_01] Yeah, and we are pulling directly from the official SuperTokens documentation, their architecture blueprints, and we've even been analyzing the raw code in their GitHub repository, specifically the SuperTokens core repo.

1:52

[SPEAKER_00] Right.

1:53

[SPEAKER_00] OK, let's unpack this.

1:54

[SPEAKER_00] Why is user authentication such a massive headache in the first place?

1:57

[SPEAKER_00] I mean, it affects user experience, developer experience, security.

2:00

[SPEAKER_00] It feels like something we should have standardized like 20 years ago.

2:03

[SPEAKER_01] You would think so, wouldn't you?

2:05

[SPEAKER_01] But it remains a massive headache because the target is constantly moving.

2:10

[SPEAKER_01] And the philosophy we see throughout the SuperToken's documentation highlights this core tension.

2:14

[SPEAKER_00] Right.

2:15

[SPEAKER_01] Like, let's say you're a developer and you decide to hand roll your own authentication from scratch just to keep control.

2:21

[SPEAKER_00] I feel like every time a developer says, I'll just write my own crypto, a security engineer somewhere just wakes up in a cold sweat.

2:29

[SPEAKER_01] Oh, absolutely.

2:30

[SPEAKER_01] Unless you are a dedicated cryptographer, hand rolling your auth almost inevitably leads to critical flaws.

2:37

[SPEAKER_00] Like what, for example?

2:38

[SPEAKER_01] Well, developers might forget to properly salt their passwords, for one.

2:43

[SPEAKER_01] Salting is the mechanism where you add a unique string of random data to each user's password before you mathematically scramble or hash it.

2:50

[SPEAKER_00] Right, to make it unique.

2:51

[SPEAKER_01] Exactly.

2:52

[SPEAKER_01] And if you don't do that, hackers can use pre-computed tables of common passwords to crack your database in literally seconds.

2:59

[SPEAKER_01] Or maybe a developer misconfigures the secure flags on session cookies, leaving users vulnerable to session hijacking.

3:06

[SPEAKER_00] So basically building it yourself is a total minefield.

3:09

[SPEAKER_01] It really is.

3:10

[SPEAKER_00] And that pushes developers to the other extreme, right?

3:12

[SPEAKER_00] They go to a giant corporation and essentially say, Hey, can I rent a bank vault?

3:17

[SPEAKER_00] You get the security, but the landlord keeps the master key.

3:20

[SPEAKER_01] Which creates massive vendor lock-in.

3:23

[SPEAKER_00] Exactly.

3:24

[SPEAKER_00] So looking at the super tokens architecture, how do they actually provide the vault and let you keep the master key?

3:31

[SPEAKER_00] Like how are they solving this?

3:32

[SPEAKER_01] So they've engineered an open core Y Combinator-backed alternative, and their foundational promise is on-premises deployment.

3:40

[SPEAKER_00] OK, so you run it yourself.

3:41

[SPEAKER_01] Right.

3:41

[SPEAKER_01] You deploy it on your infrastructure, connect it to your own database, meaning you own 100% of your user data.

3:48

[SPEAKER_01] But to make this manageable, they completely decoupled the architecture into three distinct building blocks.

3:53

[SPEAKER_00] OK, break those blocks down for me, because if I'm looking at a standard web app, I usually just think, well, front end and back end.

3:59

[SPEAKER_01] Sure.

4:00

[SPEAKER_01] Super Tokens uses a similar starting point.

4:02

[SPEAKER_01] So block number one is the front-end SDK.

4:05

[SPEAKER_01] This is the code living in the user's browser or on their mobile app.

4:09

[SPEAKER_01] It renders the actual login UI and manages the session tokens on the client side.

4:14

[SPEAKER_01] And they provide pre-built, highly customizable UI widgets so you can literally get a login screen running in like five minutes.

4:22

[SPEAKER_00] Wow.

4:22

[SPEAKER_00] Okay.

4:22

[SPEAKER_00] Which is great for speed.

4:24

[SPEAKER_00] So the user clicks login on the front-end SDK.

4:26

[SPEAKER_00] What happens next?

4:27

[SPEAKER_01] The request goes to block two, which is the backend SDK.

4:31

[SPEAKER_01] This sits directly inside your existing server application, whether your team writes in Node.js, Python, Go, Ruby, whatever.

4:38

[SPEAKER_01] This SDK intercepts the login request and provides the APIs for sign up, sign in, and refreshing sessions.

4:45

[SPEAKER_00] Wait, hold on.

4:46

[SPEAKER_00] If I'm a new developer, having a frontend taking the credentials and a backend receiving them, that sounds like a complete app.

4:52

[SPEAKER_00] But you said there are three blocks.

4:54

[SPEAKER_00] Why split the core from the backend SDK?

4:56

[SPEAKER_00] That just sounds overly complicated.

4:58

[SPEAKER_01] Well, what's fascinating here is that the specific decoupling is the secret to their flexibility because block three is the super tokens core.

5:06

[SPEAKER_01] This is a completely separate standalone HTTP service and the super tokens core handles all the heavy lifting, the complex cryptographic logic, reading and writing to your database.

5:17

[SPEAKER_01] Your backend SDK simply talks to this core service.

5:21

[SPEAKER_01] You can actually use super tokens for just log in, just session management or both.

5:25

[SPEAKER_00] I mean, if I can play devil's advocate here for a second.

5:29

[SPEAKER_00] If I'm running a lean, agile startup, the moment you tell me I have to deploy and maintain a completely separate standalone core service just to let my users log in, my alarm bells are ringing.

5:40

[SPEAKER_01] That's a common reaction.

5:41

[SPEAKER_00] Right.

5:42

[SPEAKER_00] Because that sounds like a DevOps nightmare.

5:44

[SPEAKER_00] Why not just bake the database logic right into the backend SDK?

5:48

[SPEAKER_01] It's a very valid concern.

5:50

[SPEAKER_01] But think about modern company infrastructure.

5:52

[SPEAKER_01] You rarely just have one backend anymore, do you?

5:55

[SPEAKER_00] Well, yeah.

5:55

[SPEAKER_00] I guess that's true.

5:56

[SPEAKER_01] You might have a Node server handling your web app, a Python server running your AI features, and maybe a Go server handling real-time chat.

6:05

[SPEAKER_00] Ah, right.

6:06

[SPEAKER_00] Microservices.

6:07

[SPEAKER_01] Exactly.

6:08

[SPEAKER_01] If the auth logic was baked directly into the backend, you'd have to implement and synchronize complex database operations across Node, Python, and Go.

6:16

[SPEAKER_01] It'd be a mess.

6:17

[SPEAKER_00] Awful.

6:17

[SPEAKER_01] By pulling the heavy security logic out into one central supertokens core, your microservices don't need to know how to hash passwords or query user tables.

6:27

[SPEAKER_01] They just ping the core.

6:28

[SPEAKER_01] It gives you a single source of truth.

6:30

[SPEAKER_00] OK, that actually makes a lot of sense.

6:32

[SPEAKER_00] You centralized the dangerous critical code in one place.

6:36

[SPEAKER_00] But speaking of that centralized code, I was digging through the super tokens core repository on GitHub and I noticed something that honestly made me do a double take.

6:45

[SPEAKER_01] Oh, yeah.

6:45

[SPEAKER_01] What was that?

6:46

[SPEAKER_00] The core service is written in Java, like the repost ads show it's ninety eight point four percent Java.

6:51

[SPEAKER_01] Right.

6:52

[SPEAKER_01] Yes.

6:52

[SPEAKER_00] And in the world of fast moving, trendy startups, Java often gets a bad rap, right?

6:58

[SPEAKER_00] People view it as legacy, heavy, bloated.

7:01

[SPEAKER_00] Why on earth would a modern YC backed startup choose Java for their core product?

7:06

[SPEAKER_01] Yeah, the developers actually address this exact question in their documentation, and their rationale is incredibly pragmatic.

7:13

[SPEAKER_01] Oh, so.

7:13

[SPEAKER_01] When you're building a foundational security product, you really don't want to be experimenting with the newest, trendiest programming language.

7:19

[SPEAKER_01] You want a massive, mature, battle-tested ecosystem.

7:22

[SPEAKER_00] OK, so security needs to be boring, like in the best possible way.

7:26

[SPEAKER_01] Precisely.

7:27

[SPEAKER_01] Java has been hammered by global enterprise usage for over two decades.

7:31

[SPEAKER_01] Additionally, Java's strong static typing system catches a massive class of bugs at compile time before the code ever even runs.

7:39

[SPEAKER_00] Right, which is huge for security.

7:41

[SPEAKER_01] Exactly.

7:42

[SPEAKER_01] When you're managing cryptographic keys and user identities, fewer bugs are non-negotiable.

7:46

[SPEAKER_01] Plus, from a company-building perspective, finding highly experienced Java developers to scale their team is just much easier than hunting for engineers fluent in, like, super-niche systems languages.

7:57

[SPEAKER_00] I completely buy the security and hiring arguments.

8:00

[SPEAKER_00] I really do.

8:01

[SPEAKER_00] But what about performance critique?

8:03

[SPEAKER_00] I mean, the classic complaint about Java is that it's an absolute memory hog.

8:08

[SPEAKER_00] If I'm self-hosting this, I don't want to spin up a massive, expensive AWS instance just to run my login core.

8:14

[SPEAKER_00] Doesn't that defeat the whole purpose of escaping big vendors?

8:17

[SPEAKER_01] This is where their architectural choices really shine.

8:19

[SPEAKER_01] And it goes back to that three block system.

8:22

[SPEAKER_01] Think about how authentication actually works in practice.

8:25

[SPEAKER_01] Logging in like, typing a password and hashing it is actually a very rare event.

8:29

[SPEAKER_01] A user does it maybe once a month.

8:31

[SPEAKER_00] Right, they log in and then they just stay logged in.

8:33

[SPEAKER_01] Exactly.

8:34

[SPEAKER_01] The most frequent operation by far is session verification.

8:38

[SPEAKER_01] Every single time a user clicks a link, updates their profile, or loads a private image, the system has to verify that their session is still valid.

8:48

[SPEAKER_01] If the Super Tokens Jamacore had to process every single one of those verification checks over the network, it would absolutely become a bottleneck.

8:56

[SPEAKER_01] And yeah, it would require a massive server.

8:58

[SPEAKER_00] So how do they avoid that?

8:59

[SPEAKER_00] Do they cache it or something?

9:01

[SPEAKER_01] No, they use a mechanism where verification happens entirely within the backend SDK like in Node, Go, or Python without ever contacting the Java core.

9:09

[SPEAKER_00] Wait, if the backend SDK doesn't talk to the core, how does it know the user isn't an imposter?

9:15

[SPEAKER_01] It all comes down to JSON web tokens or GWTs and cryptographic signatures.

9:21

[SPEAKER_01] Think of the Java core like an embassy issuing a passport.

9:24

[SPEAKER_00] OK, I like that analogy.

9:25

[SPEAKER_01] When you log in, the core verifies your identity and issues a passport, the JWT.

9:32

[SPEAKER_01] This token has a mathematical signature stamped on it.

9:35

[SPEAKER_01] Now, your backend SDK acts like the border guard.

9:39

[SPEAKER_00] Right.

9:40

[SPEAKER_01] When a user tries to access a page, they present that passport.

9:43

[SPEAKER_01] The border guard doesn't need to call the embassy every single time to ask if the passport is real.

9:48

[SPEAKER_00] because they can just check the stamp.

9:50

[SPEAKER_01] Exactly.

9:51

[SPEAKER_01] They have the public key, the mathematical formula, to verify the embassy signature right there on the spot.

9:57

[SPEAKER_01] Because the back-end SDK can verify the math locally, it takes less than a millisecond.

10:02

[SPEAKER_01] And the Java core never even hears about it.

10:04

[SPEAKER_00] Oh, wow.

10:05

[SPEAKER_00] So they've effectively outsourced the heaviest processing burden directly to the client's own servers.

10:10

[SPEAKER_00] That completely flips traditional backend scaling on its head.

10:13

[SPEAKER_01] It really does.

10:14

[SPEAKER_01] Because the core isn't bogged down verifying every click, a single lightweight instance of the Java core can handle tens of thousands of users easily.

10:22

[SPEAKER_00] That's incredible.

10:23

[SPEAKER_01] Yeah.

10:23

[SPEAKER_01] And to optimize the Java footprint itself, they don't use massive enterprise application servers.

10:28

[SPEAKER_01] They use an embedded Tomcat server, which is really stripped down.

10:32

[SPEAKER_01] And they also plan to use Graal VM in the future.

10:35

[SPEAKER_00] Graal VM.

10:36

[SPEAKER_00] For the listener who isn't deep into the Java ecosystem, what does Graal VM actually do?

10:41

[SPEAKER_01] So usually Java runs on a virtual machine that translates code on the fly.

10:46

[SPEAKER_01] That requires a decent amount of RAM just to keep the engine running.

10:49

[SPEAKER_01] GrelVM is a modern technology that takes that Java code and pre-compiles it directly down into a native machine executable.

10:57

[SPEAKER_00] Oh, so it just runs directly on the hardware.

10:59

[SPEAKER_01] Exactly.

11:00

[SPEAKER_01] It allows the program to start instantly and sift memory like a lightweight language.

11:04

[SPEAKER_01] SuperTokens projects this could reduce the core's memory footprint by up to 95%.

11:09

[SPEAKER_00] A 95% memory reduction is wild.

11:11

[SPEAKER_00] Okay, so the engine under the hood is mathematically clever, it scales, it's lightweight, but knowing the engine is solid is only half the battle, right?

11:19

[SPEAKER_00] Here's where it gets really interesting.

11:21

[SPEAKER_00] What can you actually build with it?

11:22

[SPEAKER_00] Like, what's the out of the box feature set?

11:24

[SPEAKER_01] Well, the feature set is remarkably comprehensive for an open source tool.

11:28

[SPEAKER_01] They aren't just giving you a basic email and password form.

11:31

[SPEAKER_01] They provide passwordless login via magic links.

11:34

[SPEAKER_01] They have full social login support.

11:36

[SPEAKER_01] So, you know, continue with Google, Apple, GitHub.

11:39

[SPEAKER_00] Nice.

11:40

[SPEAKER_01] And they include natively built multi-factor authentication, which is basically a mandatory compliance requirement now.

11:46

[SPEAKER_00] And looking through their documentation, they also heavily highlight multi-tenancy.

11:51

[SPEAKER_01] Yes, which is a massive differentiator for B2B software.

11:55

[SPEAKER_01] Multi-tenancy is what allows you to offer enterprise single sign-on or SSO.

12:00

[SPEAKER_00] Let's pause on SSL because I feel like users see it all the time but might not realize how complex it is.

12:05

[SPEAKER_00] This is when you try to log into a software tool and it redirects you to your company's internal Microsoft or Okta login page, right?

12:13

[SPEAKER_01] Exactly.

12:14

[SPEAKER_01] If you build an app and try to sell it to a Fortune 500 company, their IT department will absolutely demand that their employees log in using the company's existing corporate credentials.

12:24

[SPEAKER_01] Building the SAMALO or OIDC protocols to connect your database securely

12:29

[SPEAKER_01] to a massive corporation's active directory is notoriously painful.

12:34

[SPEAKER_01] But supertokens having multi-tenancy built in means you can compartmentalize different enterprise clients within the same instance securely.

12:43

[SPEAKER_00] It's like having one apartment building, but every tenant gets their own highly customized security system.

12:48

[SPEAKER_01] That's a great way to put it.

12:50

[SPEAKER_00] And speaking of customization, they have a really interesting approach to adding features.

12:54

[SPEAKER_00] You don't have to rewrite the core code.

12:56

[SPEAKER_01] Right.

12:56

[SPEAKER_01] They use a highly modular plugins architecture.

13:00

[SPEAKER_00] Yeah.

13:00

[SPEAKER_00] The way I visualize this is like having a smartphone.

13:02

[SPEAKER_00] The super tokens core is the operating system.

13:05

[SPEAKER_00] But if you suddenly need your phone to, I don't know, scan QR codes, you don't rewrite the OS.

13:10

[SPEAKER_00] You just download an app.

13:12

[SPEAKER_00] Their plugins act exactly like apps for your authentication core.

13:15

[SPEAKER_01] Perfect analogy.

13:16

[SPEAKER_01] The plugins are entirely modular.

13:18

[SPEAKER_01] So if your platform suddenly gets targeted by automated bots trying to brute force your login page, you don't panic and rewrite your front end.

13:26

[SPEAKER_00] You just snap in a plugin.

13:27

[SPEAKER_01] Exactly.

13:28

[SPEAKER_01] You just snap in their Capshot plugin, which natively integrates things like recap TCHA or Cloudflare turnstile.

13:35

[SPEAKER_01] They have plugins for user banning.

13:37

[SPEAKER_01] So an admin can instantly revoke a bad actor's access everywhere and plugins for tenant discovery interfaces.

13:44

[SPEAKER_00] It's one thing to read a list of features, but the real-world examples they share really prove its value.

13:49

[SPEAKER_00] There's a fascinating story in the sources about Poppy, which is a Belgian ride-sharing company.

13:54

[SPEAKER_01] Oh, yeah.

13:55

[SPEAKER_01] Ride-sharing apps are incredibly lucrative targets for fraud.

13:58

[SPEAKER_00] Huge targets.

13:59

[SPEAKER_00] You have bad actors creating fake accounts to take free rides, testing stolen credit cards, you name it.

14:05

[SPEAKER_00] Poppy decided to switch their entire authentication system over to supertokens.

14:10

[SPEAKER_00] and they managed to do it in just one day.

14:11

[SPEAKER_01] Wow, one day?

14:13

[SPEAKER_00] Yeah, and by locking down their off-flow, they eliminated thousands of euros in daily fraud in a single afternoon.

14:20

[SPEAKER_01] That really validates their claim of the five-minute setup.

14:23

[SPEAKER_01] When an API is logically designed, swapping out an old, leaky system doesn't have to be a six-month engineering saga.

14:30

[SPEAKER_00] Exactly.

14:30

[SPEAKER_00] And there's another example that stood out to me.

14:32

[SPEAKER_00] Traceable.ai.

14:34

[SPEAKER_00] They've raised like over $80 million, so they clearly have a budget to buy whatever they want.

14:39

[SPEAKER_00] But they explicitly chose super tokens because other open source options were simply too complex.

14:46

[SPEAKER_01] Right.

14:46

[SPEAKER_01] A lot of the alternatives require deploying multiple different services.

14:50

[SPEAKER_00] Exactly.

14:50

[SPEAKER_00] The competitors required them to orchestrate a dozen different microservices just to get a basic login system working.

14:57

[SPEAKER_00] They needed something robust but simple to deploy.

15:00

[SPEAKER_00] Super tokens fit the bill perfectly.

15:02

[SPEAKER_01] But, you know, this raises an important question about the reality of migrating user bases.

15:07

[SPEAKER_01] It is incredibly easy to look at a sleek new tool and say, wow, I wish we had built our application with this from day one.

15:13

[SPEAKER_00] Oh, for sure.

15:14

[SPEAKER_01] But the reality is most established companies are deeply entrenched.

15:18

[SPEAKER_01] They are currently stuck paying massive monthly invoices to Auth or AWS Cognito.

15:23

[SPEAKER_01] How do they actually escape without ruining their users' experience?

15:27

[SPEAKER_00] Yeah, you can't just flip a switch and send an email to 100,000 users saying, hey, please click this link to reset your password.

15:33

[SPEAKER_00] You would lose half your active users overnight.

15:36

[SPEAKER_00] The friction is just way too high.

15:37

[SPEAKER_01] Exactly.

15:38

[SPEAKER_01] The fear of user friction is the single biggest reason companies remain chained to vendors they actively dislike.

15:46

[SPEAKER_01] But SuperToken supports both bulk and what they call lazy migrations.

15:51

[SPEAKER_00] OK, walk me through how lazy migration works.

15:54

[SPEAKER_00] Because moving users without asking them to change their password and without even forcing them to log out, that sounds like magic.

16:01

[SPEAKER_01] It's not magic, but it is brilliant API routing.

16:04

[SPEAKER_01] The migration happens invisibly to the end user one user at a time at the exact moment they try to log in.

16:09

[SPEAKER_01] OK. Let's imagine you are migrating away from us.

16:12

[SPEAKER_01] First, you set up super tokens to act as a proxy, a middleman.

16:15

[SPEAKER_00] OK, so the user goes to my app and types in their email and password.

16:19

[SPEAKER_01] Right.

16:20

[SPEAKER_01] Your SuperToken's backend SDK catches those credentials.

16:24

[SPEAKER_01] It looks at its own local database and realizes, uh-oh, I don't have this user yet.

16:29

[SPEAKER_01] Now, instead of throwing an error, SuperToken silently takes those credentials and behind the scenes fires an API request over to your old auth account.

16:37

[SPEAKER_00] Ah, so it's asking the old landlord to verify the key.

16:40

[SPEAKER_01] Precisely.

16:41

[SPEAKER_01] Auth checks its database and responds, yes, these credentials are valid.

16:45

[SPEAKER_01] SuperToken's intercepts that success message.

16:48

[SPEAKER_01] It then takes the password the user just typed, hashes it securely using its own algorithms, and creates a brand new account for that user in your self-hosted database.

16:58

[SPEAKER_01] And finally, it issues the local session token to the user.

17:01

[SPEAKER_00] And how long does all of that proxying and hashing take?

17:03

[SPEAKER_01] Fractions of a second.

17:04

[SPEAKER_01] The user experiences absolutely zero delay.

17:07

[SPEAKER_01] They don't have to reset their password.

17:08

[SPEAKER_01] From their perspective, they just logged in normally.

17:10

[SPEAKER_00] So what does this all mean?

17:12

[SPEAKER_00] It means the biggest hurdle, the terror of ruining the user experience, is completely eliminated.

17:18

[SPEAKER_00] You just completely eliminate the friction of switching to an open source, cost-saving alternative.

17:23

[SPEAKER_01] Yes.

17:24

[SPEAKER_01] You get the robust security of an enterprise giant, but you reclaim your data sovereignty.

17:30

[SPEAKER_01] Which leaves us with a really provocative final thought to ponder.

17:33

[SPEAKER_00] Hmm.

17:34

[SPEAKER_00] Late on me.

17:35

[SPEAKER_01] If authentication, the literal gateway to our digital identities, becomes completely modular, decentralized, and developer controlled, what does the future hold for those massive tech companies whose main leverage has always been holding our user data hostage?

17:51

[SPEAKER_00] That is a great question.

17:52

[SPEAKER_00] If the vault door is suddenly affordable and incredibly easy to install yourself, the landlords are going to face an existential threat.

17:59

[SPEAKER_01] Exactly.

18:00

[SPEAKER_00] And empowering organizations to break free from that lock-in is exactly the mission of our supporter, SafeServer.

18:06

[SPEAKER_00] As we've explored today, what organizations, whether you're a business, an association, or any other group stand to gain by switching to an open source solution like SuperTokens is immense control and major cost savings.

18:17

[SPEAKER_01] Absolutely.

18:17

[SPEAKER_01] Reclaiming that data sovereignty is just so critical today.

18:20

[SPEAKER_00] It really is.

18:21

[SPEAKER_00] And just as a reminder, SafeServer can be commissioned for consulting.

18:25

[SPEAKER_00] So whether the right fit for your specific organization is SuperTokens,

18:29

[SPEAKER_00] or a comparable open source alternative, they have the expertise to help you figure it out.

18:35

[SPEAKER_00] You can find more information and get in touch with them at www.safeserver.de.

18:40

[SPEAKER_01] It's definitely worth checking out.

18:41

[SPEAKER_00] Well, thank you so much for joining us on this deep dive.

18:44

[SPEAKER_00] Keep questioning the software you rely on every day, because at the end of the day, it's your digital house.

18:50

[SPEAKER_00] You should be the one holding the master key to the front door.