Step-by-step guides to building real features with Ubex workflows.
Complete database setup, secrets configuration, and security checklist for the entire auth system.
2Schema validation, password hashing, duplicate detection, hashed tokens, and email verification.
3Secure token-based verification with rate limiting, hashed tokens, expiration, and audit logging.
4Authenticate users, verify account status, and issue JWT tokens.
5Secure password reset with rate limiting, hashed tokens, expiration, and audit logging.
6JWT-authenticated password change with current password verification and strength enforcement.
7One-time password authentication for enhanced security via email.
8Time-based one-time passwords with Google Authenticator or Authy.
Check out our documentation or reach out to the community on Discord.