Authentication
Overview
Authentication Methods
1. Stytch Session Authentication (Dashboard)
2. API Key Authentication (Programmatic)
Stytch Integration
Dashboard Authentication
User Resolution
API Key Authentication
Secret Keys
Publishable Keys
Authorization
User Ownership
Environment Scoping
Session Management
Token Extraction
Token Validation
Next Steps
Last updated