Authentication
Authress provides independent components for Authorization, Authentication, Extensions, Credential Vaults, etc... Each of these can be used separately, this section provides articles and guides on user, machine-to-machine, as well as how to configure each of these for your users. For a guided wizard on Authentication, check out the Authress Management Portal quick start guides.
๐๏ธ General Setup
Integrating identity providers such as Google into your web application can be challenging, here's a quick start for any site.
๐๏ธ User authentication
Enabling your users to login and authenticate in Authress via a unified authentication solution.
๐๏ธ API authentication
Enabling your technical users to authenticate to your software and generate service client access and api keys
๐๏ธ Verifying JWTs
Authress generated access tokens should be verified to ensure their authenticity.
๐๏ธ Connecting providers (IdP)
Add identity providers, connect external auth systems and Cloud or CICD OIDC integrations.
๐๏ธ OIDC Trusted Identities
Configure Authress to trust your existing identity providers
๐๏ธ Tenants and organizations
Tenants are your groups of users. Each business in your platform is tenant, and they have their own login (SSO) configuration.
๐๏ธ Custom Passwordless Login
Setup a custom flow with passwordless login for your users
๐๏ธ Linking user accounts
How to link user accounts and manage multiple user sessions on the same device