Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/passkey-examples/Passkey-example.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added content/passkey-examples/Supertokens.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
337 changes: 337 additions & 0 deletions content/passkey-examples/index.md

Large diffs are not rendered by default.

23 changes: 23 additions & 0 deletions static/blog-seo/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -3301,6 +3301,29 @@
"schema": "<script type=\"application/ld+json\"> {\n \"@context\": \"https://schema.org\",\n \"@type\": \"Article\",\n \"mainEntityOfPage\": {\n \"@type\": \"WebPage\",\n \"@id\": \"https://supertokens.com/blog/identity-and-access-management-strategy\"\n },\n \"headline\": \"Discover how to develop an effective Identity and Access Management (IAM) strategy that secures sensitive data, ensures compliance, and streamlines user experiences.\",\n \"image\": \"https://supertokens.com/blog-meta-images/iam-strategy.png\",\n \"author\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"url\": \"https://supertokens.com\"\n },\n \"publisher\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"logo\": {\n \"@type\": \"ImageObject\",\n \"url\": \"https://supertokens.com/static/assets/dark-home/logo.png\"\n }\n }\n }</script>"
},
{
"path": "/blog/passkey-examples",
"metaTags": [
"<meta name=\"description\" content=\"Discover real-world passkey examples across Apple, Google, Coinbase, iPhone, PHP, and more, plus step-by-step implementation guidance.\" />",
"",
"<meta name=\"keywords\" content=\"Authentication, Open Source, Authorization, User Management, OAuth, Enterprise SSO, Security\" />",
"<!--OG Tags-->",
"<meta property=\"og:title\" content=\"Passkey Examples: Real-World Use Cases and Implementation\" />",
"<meta property=\"og:type\" content=\"article\" />",
"<meta property=\"og:url\" content=\"https://supertokens.com/blog/passkey-examples\" />",
"<meta property=\"og:description\" content=\"Discover real-world passkey examples across Apple, Google, Coinbase, iPhone, PHP, and more, plus step-by-step implementation guidance.\"/>",
"<meta property=\"og:image\" content=\"https://supertokens.com/blog-meta-images/passkey-examples.png\" />",
"",
"<meta name=\"twitter:card\" content=\"summary_large_image\" />",
"<meta name=\"twitter:title\" content=\"Discover real-world passkey examples across Apple, Google, Coinbase, iPhone, PHP, and more, plus step-by-step implementation guidance.\" />",
"<meta name=\"twitter:url\" content=\"https://supertokens.com/blog/passkey-examples\" />",
"<meta name=\"twitter:image\" content=\"https://supertokens.com/blog-meta-images/passkey-examples.png\" /> ",
"<!--OG Tags-->",
"<link rel=\"canonical\" href=\"https://supertokens.com/blog/passkey-examples\">"
],
"title": "Passkey Examples: Real-World Use Cases and Implementation",
"schema": "<script type=\"application/ld+json\"> {\n \"@context\": \"https://schema.org\",\n \"@type\": \"Article\",\n \"mainEntityOfPage\": {\n \"@type\": \"WebPage\",\n \"@id\": \"https://supertokens.com/blog/passkey-examples\"\n },\n \"headline\": \"Discover real-world passkey examples across Apple, Google, Coinbase, iPhone, PHP, and more, plus step-by-step implementation guidance.\",\n \"image\": \"https://supertokens.com/blog-meta-images/passkey-examples.png\",\n \"author\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"url\": \"https://supertokens.com\"\n },\n \"publisher\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"logo\": {\n \"@type\": \"ImageObject\",\n \"url\": \"https://supertokens.com/static/assets/dark-home/logo.png\"\n }\n }\n }</script>"
},
{
"path": "/blog/stytch-vs-auth0",
"metaTags": [
"<meta name=\"description\" content=\"Discover how Stytch and Auth0 compare in pricing, features, developer experience, and fraud tools — plus explore an open-source, self-hosted alternative offering full control and transparency for modern authentication.\" />",
Expand Down
3 changes: 3 additions & 0 deletions static/blog-seo/sitemapconfig.json
Original file line number Diff line number Diff line change
Expand Up @@ -308,6 +308,9 @@
{
"location": "https://supertokens.com/blog/identity-and-access-management-strategy"
},
{
"location": "https://supertokens.com/blog/passkey-examples"
},
{
"location": "https://supertokens.com/blog/stytch-vs-auth0"
},
Expand Down
Binary file added static/card_covers/passkey-examples.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/covers/passkey-examples.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading