copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2019-11-22 |
authentication, authorization, identity, web flow, backend, identity management, anonymous auth, custom flow, mobile, app to app, kubernetes, ingress, istio, app security, |
appid |
{:external: target="_blank" .external} {:shortdesc: .shortdesc} {:screen: .screen} {:pre: .pre} {:table: .aria-labeledby="caption"} {:codeblock: .codeblock} {:tip: .tip} {:note: .note} {:important: .important} {:deprecated: .deprecated} {:download: .download}
{: #adding-overview}
You can quickly add authentication and authorization to your application by integrating {{site.data.keyword.appid_short_notm}}. Regardless of the type of flow that you use, you can securely authenticate users to your app. With authentication in place, you can provide personalized user experiences across all types of devices. {: shortdesc}
Check out the following table to see how {{site.data.keyword.appid_short_notm}} fits into each type of application.
Type of authentication flow | |
---|---|
Single-page | You can use the single-page flow to securely authenticate users to your applications. An SPA runs entirely in your browser and does not require that the page be reloaded while the application is in use. |
Web | You can use the web flow to securely authenticate users to your application and protect your server-side resources. |
Mobile | The {{site.data.keyword.appid_short_notm}} mobile flow is most helpful when you're developing applications that are made to be installed on a user's device as a native application. |
Backend | You can protect your development resources and API endpoints from unauthorized access and ensure the security of your app by using the backend flow. |
Custom | Already have your own custom flow? No problem. You can use the custom identity flow to integrate {{site.data.keyword.appid_short_notm}} with your app. |
Anonymous | With {{site.data.keyword.appid_short_notm}}, you can begin tracking a users activity before their initial sign in to your app by using anonymous authentication. |
Ingress | With {{site.data.keyword.appid_short_notm}}, you can consistently enforce policy-driven security by using the Ingress networking capability in {{site.data.keyword.containerlong}}. |
Istio | By using the App Identity and Access adapter, you can centralize all of your identity management in a single place. Because enterprises use clouds from multiple providers or a combination of on and off-premise solutions, heterogeneous deployment models can help you to preserve existing infrastructure and avoid vendor lock-in. |