Manage authentication across every surface your product runs on with a shared identity layer.
A default application is automatically generated for each environment. If your product only has one client, no action is needed. You can see and set your application’s API keys, Redirects and Sessions configuration in the Applications section of the WorkOS Dashboard.
Multiple Applications lets developers define each client as its own application object within an environment in the WorkOS Dashboard. Each application gets its own client ID, session configuration, redirect URIs, and credentials, while sharing the same underlying user pool. Users and organizations are shared across applications with a unified login experience, without duplicate accounts or fragmented identity data.
Multiple Applications is not the right fit for every scenario. Two common cases where a different approach is better:
If you need entirely separate user pools, use separate environments instead. Each environment maintains its own isolated set of users and organizations.
If your goal is to present a different look and feel on the AuthKit login screen, that’s a branding concern rather than an application modeling one. Branding for the hosted AuthKit UI is configured in the Branding section of the WorkOS Dashboard and is globally applied to all applications in all environments.
If you need more branding control and customization, WorkOS supports the option to self-host your UI and manage authentication with the AuthKit API.
Applications are created and managed in the Applications section of the WorkOS Dashboard.
Once created, each application exposes its own configuration surface:
The first application listed in the Applications section of the WorkOS Dashboard is the application that was automatically generated for the environment. You can think of this first application as the default application.
Invitations sent via the WorkOS Dashboard are always associated with the environment’s default application.
Invitations sent via the API or User Management widget will preserve the application context of the API key/widget so that the invited user lands in the right place.
ississ claim is the same for all applications in the environment. It will reference the default application’s client id.client_idclient_id claim will reflect the client_id for the current application context.Claims from the application context can be surfaced in the JWT Template.