+
-## โจ Features
+### Authentication
-To get notified first when we add new features, please subscribe to [our newsletter](https://stack-auth.beehiiv.com/subscribe).
+Authentication that just works with passkeys, OAuth, and CLI auth. Drop in one component and ship the whole flow; auth methods toggle from the dashboard with no code changes needed.
-| | |
-|-|:-:|
-| `` and `` Authentication components that support OAuth, password credentials, and magic links, with shared development keys to make setup faster. All components support dark/light modes. | |
-| Idiomatic Next.js APIs We build on server components, React hooks, and route handlers. |  |
-| User dashboard Dashboard to filter, analyze, and edit users. Replaces the first internal tool you would have to build. |  |
-| Account settings Lets users update their profile, verify their e-mail, or change their password. No setup required. | |
-| Multi-tenancy & teams Manage B2B customers with an organization structure that makes sense and scales to millions. | |
-| Role-based access control Define an arbitrary permission graph and assign it to users. Organizations can create org-specific roles. | |
-| OAuth ConnectionsBeyond login, Stack Auth can also manage access tokens for third-party APIs, such as Outlook and Google Calendar. It handles refreshing tokens and controlling scope, making access tokens accessible via a single function call. | |
-| Passkeys Support for passwordless authentication using passkeys, allowing users to sign in securely with biometrics or security keys across all their devices. | |
-| Impersonation Impersonate users for debugging and support, logging into their account as if you were them. | |
-| Webhooks Get notified when users use your product, built on Svix. | |
-| Automatic emails Send customizable emails on triggers such as sign-up, password reset, and email verification, editable with a WYSIWYG editor. | |
-| User session & JWT handling Stack Auth manages refresh and access tokens, JWTs, and cookies, resulting in the best performance at no implementation cost. | |
-| M2M authentication Use short-lived access tokens to authenticate your machines to other machines. | |
+ |
+
+
+ |
+