Welcome to Stytch Docs!
Why Stytch?
Stytch provides authentication, authorization, and fraud detection that adapts with your code base, your customers and threat vectors.
Auth tailored to your use case
Stytch offers two distinct authentication suites, B2B and Consumer, each precision tailored to the unique dynamics and future edge cases of building in these spaces.
Read more about Stytch B2B or consumer auth
Flexible architecture
Stytch is natively embedded into your application, allowing you to leverage our backend and client-side SDKs to build exactly what you need.
Read about Stytch’s flexible integration methods
Fraud prevention on top of your authentication
Stytch offers industry leading accuracy in device intelligence, that allows you to easily stop fraud, abuse and attackers at the door. In today’s increasingly complex and hostile internet, customer identity must be considered holistically – factoring in browser, network and device signals in addition to careful examination of the specifics of how the user is authenticating before verifying their identity. Stytch handles all of this complexity for you automatically, returning clear verdicts that tell you how to proceed.
Read more about Stytch’s approach to fraud and risk prevention