Features Details

Performance and Scale

Built in Go using fasthttp, GoAM is designed for maximum performance and low latency, capable of handling thousands of logins per second.

Performance and Scale

Introduction:

Authentication is the front door to your systems. Any latency, lag, or downtime at this critical step directly translates to lost users, frustrated customers, and lost revenue. An identity solution cannot be an afterthought; it must be a high-throughput, low-latency component capable of handling internet-scale traffic.

GoAM was architected from the ground up for speed. The deliberate choice of Go and the fasthttp library ensures minimal resource consumption, high concurrency, and incredibly fast response times. This makes it suitable for the most demanding workloads, from login "flash crowds" during a marketing campaign to high-volume API authentication.

Compared to traditional IAMs GoAM has a very small footprint of only around 50MB memory consumption. Our architecture with FastHTTP enable thousands of request per second with sub <5ms. GoAM is horizontally scalable, the only bottleneck is the database. Per default we use Postgres which is good enough for most. If we need to go really big, like milllions of parallel request and users we can use Cockroach Db or Google Cloud Spanner. If you have your own database already in place we can integrate with it using a custom DB adapter.

Use Case Example

A large-scale mobile gaming company can use GoAM to handle the massive, sudden spike of logins that occurs when a new game is launched or a major event starts. The system's ability to handle thousands of concurrent requests per second ensures a smooth login experience for all players.

A B2B SaaS provider can leverage GoAM's multitenancy to serve hundreds of different customer organizations from a single, scalable deployment. Each customer (tenant) has its own isolated configuration, userbase, and authentication flows, all while sharing the same underlying high-performance engine, making management efficient and cost-effective.

Offer Your Users Secure and Easy Login Experiences

Ready to elevate your very first user touchpoint? Contact us today and transform your business with better user experiences.

AirTide Webflow template Image
Our Blog

Blogs & Articles

Swiss E-ID: Issuing Credentials
Technology
6 min read

Swiss E-ID: Issuing Credentials

A technical walkthrough on Swiss E-ID credential issuance. This guide details setting up the swiyu-issuer service, issuing a custom VC via OID4VCI, and testing a verifier security flaw by spoofing a betaid-sdjwt credential.
Swiss E-ID Beta, a First Look
Technology
10min read

Swiss E-ID Beta, a First Look

In this post we explore how the verification process of the Swiss E-ID works with the swiyu wallet and break down the OID4VP (OpenID) request codes used to check credentials. Step-by-step we go through the steps for developers to build their own local proof-of-concept (PoC) verifier using Docker, including how to register a DID in the SWIYU system. Finally, we analyze the communication flow and discuss a potential security weakness found during testing.