Skip to content

Latest commit

 

History

History
73 lines (61 loc) · 3.77 KB

adding-overview.md

File metadata and controls

73 lines (61 loc) · 3.77 KB
copyright lastupdated keywords subcollection
years
2017, 2019
2019-11-22
authentication, authorization, identity, web flow, backend, identity management, anonymous auth, custom flow, mobile, app to app, kubernetes, ingress, istio, app security,
appid

{:external: target="_blank" .external} {:shortdesc: .shortdesc} {:screen: .screen} {:pre: .pre} {:table: .aria-labeledby="caption"} {:codeblock: .codeblock} {:tip: .tip} {:note: .note} {:important: .important} {:deprecated: .deprecated} {:download: .download}

Adding {{site.data.keyword.appid_short_notm}} overview

{: #adding-overview}

You can quickly add authentication and authorization to your application by integrating {{site.data.keyword.appid_short_notm}}. Regardless of the type of flow that you use, you can securely authenticate users to your app. With authentication in place, you can provide personalized user experiences across all types of devices. {: shortdesc}

Check out the following table to see how {{site.data.keyword.appid_short_notm}} fits into each type of application.

Table 1. The different ways in which you can secure your applications with {{site.data.keyword.appid_short_notm}}
Type of authentication flow
Single-page You can use the single-page flow to securely authenticate users to your applications. An SPA runs entirely in your browser and does not require that the page be reloaded while the application is in use.
Web You can use the web flow to securely authenticate users to your application and protect your server-side resources.
Mobile The {{site.data.keyword.appid_short_notm}} mobile flow is most helpful when you're developing applications that are made to be installed on a user's device as a native application.
Backend You can protect your development resources and API endpoints from unauthorized access and ensure the security of your app by using the backend flow.
Custom Already have your own custom flow? No problem. You can use the custom identity flow to integrate {{site.data.keyword.appid_short_notm}} with your app.
Anonymous With {{site.data.keyword.appid_short_notm}}, you can begin tracking a users activity before their initial sign in to your app by using anonymous authentication.
Ingress With {{site.data.keyword.appid_short_notm}}, you can consistently enforce policy-driven security by using the Ingress networking capability in {{site.data.keyword.containerlong}}.
Istio By using the App Identity and Access adapter, you can centralize all of your identity management in a single place. Because enterprises use clouds from multiple providers or a combination of on and off-premise solutions, heterogeneous deployment models can help you to preserve existing infrastructure and avoid vendor lock-in.