The Problem

Building auth from scratch is where most portals ship insecure

🔑

Password Auth Is a Liability

Storing hashed credentials, handling forgot-password flows, enforcing complexity rules — magic links eliminate credentials entirely. No password database means no password database breach.

🗂️

Role Logic Is Messy to Build

Every portal has at least two access tiers and most have four or five. Building role enforcement across every route and API call is tedious and expensive. ExecSignIn Pro handles it at the auth layer.

📋

No Audit Trail = No Accountability

Most developer-built auth systems log nothing. When an access incident happens there's no record of who accessed what and when. ExecSignIn Pro emits a complete audit event for every authenticated action.

🏗️

Auth Infrastructure Is Overhead

Running your own auth server means managing uptime, scaling session storage, and keeping up with security patches. ExecSignIn Pro runs serverless on Netlify — no server to manage, no infrastructure to maintain.

Features

Production-grade auth for operator portals. No backend team required.

✉️

Magic Link Login

Users enter their email and receive a one-time secure link — no passwords, no credential storage, no forgot-password flow. The link expires in 15 minutes, is single-use, and signs the user into a JWT session immediately on click.

🛡️

Role-Based Access Control

Four built-in access tiers — Admin, Executive, Member, Guest — each with configurable permissions. Roles are embedded in the JWT and enforced at the function level. Add role checks with a single middleware call per route.

🔑

JWT Session Management

Stateless JWTs signed with a secret stored in Netlify environment variables — no session database required. Configurable expiry (1h, 8h, 24h, 7d), automatic token refresh on activity, and explicit logout with server-side invalidation.

🔗

Google & GitHub SSO

OAuth 2.0 integrations for Google and GitHub are pre-configured — drop in your OAuth app credentials and both SSO buttons work immediately. Authenticated SSO users are mapped to portal roles on first login via configurable email-domain rules.

📋

Full Audit Logging

Every authentication event — login attempt, magic link sent, link expiry, token refresh, role change, explicit logout — is written to a structured audit log. Query by user, date range, or event type from the built-in audit dashboard.

👤

User Management Console

A built-in admin console for managing portal members — invite users by email, assign or change roles, revoke access, view session activity, and reset invite status without needing a separate database UI.

🚀

Drop-In Netlify Deploy

Deployed as Netlify Functions — no server, no Docker, no devops. Fork the repo, set five environment variables (JWT secret, email provider key, OAuth credentials), deploy, and your portal has production-grade auth in under 20 minutes.

📱

Branded Login UI

The login page is fully customizable — swap in your logo, set brand colors, add a portal-specific tagline, and configure what login methods appear. Ships as clean HTML + CSS with no framework dependencies.

At a Glance

Auth that's live before your next standup

<20m
Deploy to Live Auth
4
Built-In Access Roles
0
Passwords Stored
100%
Audit Coverage
SSO
Google + GitHub Ready
0
Servers to Manage
How It Works

Fork → Configure → Deploy → Secure

01
Fork

Fork the ExecSignIn Pro repo — everything is pre-wired and ready to configure

Clone or fork the ExecSignIn Pro repository from GitHub. The entire auth system is contained in Netlify serverless functions and a static frontend — no external auth provider or backend database required.

02
Configure

Set five environment variables — JWT secret, email provider, OAuth credentials

In your Netlify site settings, set the five required environment variables: JWT_SECRET, EMAIL_API_KEY (for magic link delivery via Resend or Postmark), JWT_EXPIRY, and optionally GOOGLE and GITHUB OAuth credentials for SSO.

03
Deploy

Push to Netlify — functions deploy automatically, login page goes live

Connect the repo to Netlify and push. Functions deploy automatically. Your login page is live at your domain, magic links are deliverable, and the admin console is accessible at /admin immediately.

04
Secure

Add role checks to your protected routes — one function call per route

Import the ExecSignIn auth middleware and call requireRole('admin') at the top of any handler. Role enforcement is consistent, centralized, and one line per protected endpoint.

Who It's For

For builders who need real auth without building an auth system

🧑‍💻Solo developers building client portals without a backend team
🏢Operators setting up internal dashboards with restricted access
🚀Startups shipping a member portal MVP without auth overhead
📊Agencies building reporting portals for multiple client accounts
💼Consultants securing client-facing deliverable and document portals
🏗️Teams building admin dashboards that need airtight access control
🔒Compliance-oriented teams that need a complete audit trail
📱PWA builders adding secure login to installable operator tools
Deploy Auth Now

Your portal deserves real auth.
Production-grade in under 20 minutes.

Magic links, role-based access, session management, SSO, and audit logging — deployed on serverless infrastructure with no backend to build or manage.

Open ExecSignIn Pro → See All Platforms

Serverless · No auth infrastructure · JWT + Magic Link · Audit-ready