Built with modern technologies and security best practices
Email/password and Google OAuth with built-in brute force protection
Email-based OTP verification for signup and password recovery
Users can view their own login history and account activity
Cron jobs automatically delete expired tokens and unused data
Clean, normalized schema with proper relationships
User profiles with account status
OAuth provider connections
OTP tokens (auto-cleaned)
Personal activity history
Clone the repository and have a secure authentication system running in minutes