Beta

The User Table You Never Have to Build

Create accounts, verify emails, and reset passwords through the API. Profiles, metadata, and search included.

User accounts

Manage users without building account infrastructure

Store user profiles with email, password, and custom attributes. Handle registration, email verification, and password resets through API calls without building account management systems.

Capabilities

Everything you need for user accounts

User registration

Create user accounts with email and password. Passwords are hashed securely and stored safely. Email verification flows trigger on registration.

Email verification

Send verification emails with secure tokens. Verify tokens through API or hosted verification pages. Track verification status per user.

Password management

Store passwords securely with industry-standard hashing. Password reset flows generate secure tokens and send reset emails automatically.

Local token verification

Verify session tokens on your servers without API calls. Fetch public keys from the JWKS endpoint and validate JWTs locally without network latency.

Profile data

Store standard profile fields like name, avatar, and phone number. Add custom attributes for application- specific data.

Custom metadata

Attach arbitrary JSON metadata to user accounts. Store subscription status, preferences, or integration identifiers without schema changes.

User search

Search users by email, name, or custom attributes. Filter by creation date, verification status, or metadata fields.

Webhooks

Receive HTTP callbacks when users sign up, verify emails, or reset passwords. Trigger workflows in your application without polling for changes.

bcrypt
Password hashing

Industry-standard algorithm

< 50ms
User lookup

Account retrieval time

Zero
API calls for auth

Verify sessions locally using Conjoin SDK

Why it matters

User management without the infrastructure

User accounts without database design

Building user tables requires schema design, migration management, and index optimization. Conjoin Auth User Management provides a ready-to-use user store with standard fields and extensible metadata.
In practice

Create your first user account in minutes. Call the signup endpoint with email and password. The user stores with hashed password, unique ID, and timestamps. Add custom fields as your application evolves.

Email verification that works

Email verification requires token generation, secure storage, expiration handling, and email sending. Conjoin handles the complete flow with configurable verification emails.
In practice

A user signs up. They receive a verification email with a secure link. Clicking the link verifies their email and updates their account status. Your application checks the verified flag without building verification infrastructure.

Password resets without security concerns

Password reset flows are security-sensitive and easy to implement incorrectly. Conjoin uses secure token generation, time-limited validity, and single-use enforcement.
In practice

A user requests a password reset. They receive an email with a one-time link valid for 1 hour. The link leads to a reset page where they set a new password. The token invalidates immediately after use.

Built for Your Workflow

Ship faster with solutions designed for real-world needs

How Conjoin solves this

Call the signup endpoint with email, password, and profile data. Conjoin hashes passwords securely, generates unique IDs, records timestamps, and triggers verification emails without additional code.

Impact

Add complete user registration to your app in minutes with production-grade security.

How Conjoin solves this

Trigger verification emails on signup or on demand through the API. Secure tokens generate with configurable expiration, and verification can happen through API calls or hosted pages that handle the UI.

Impact

Verify email ownership without building token generation, storage, or email sending.

How Conjoin solves this

Generate cryptographically secure reset tokens with configurable expiration. Tokens invalidate immediately after use, preventing replay attacks. Reset emails send through pre-warmed infrastructure for reliable delivery.

Impact

Ship secure password resets without implementing token security or email infrastructure.

How Conjoin solves this

Search users by email, name, metadata fields, or full-text queries. Filter by verification status, creation date, or custom attributes. Results paginate efficiently for large user bases.

Impact

Build admin dashboards and support tools without writing complex database queries.

How Conjoin solves this

Verify session tokens locally using public keys from the JWKS endpoint. The Conjoin SDK caches keys and validates JWTs on your server without network calls, adding sub-millisecond overhead to each request.

Impact

Authenticate millions of requests without API latency or hitting rate limits.

Ship your application today

Start building with Conjoin today. Free tier includes everything you need to prototype and launch. Scale when you're ready.