Git Product home page Git Product logo

docs's Introduction

Authing: Connect Every Person and App on the Planet

Authing

Authing quickly implements authentication and user management for any Web, App, and enterprise software to provide the most complete login solution for your customers and employees.

Authing does two things for you:

  • CIAM (Customer Identity & Access Management)

    Create a secure and seamless authentication experience for your customers.

  • EIAM (Enterprise Identity & Access Management)

    Protect and enable your workforce to use any technology on any device.

    Thousands of enterprises & developers trust Authing.

What is Authing?

Authing serves as an identity infrastructure, or Identity As A Service (IDaaS) for cloud computing.

Authing focuses on identity and building social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business, but also redefines the user experience.

Infrastructure for identity sharing across all SaaS software and users

Authing is the foundation for secure connections between a complex identity ecology and an application ecology in which countless identities access applications and resources in a borderless way.

Key functions: Multi-factor login

API First

Authing taking "API first" as the product cornerstone, all commonly used functions in the identity field are modularized and all capabilities are provided to developers through the full scene programming language SDK. At the same time, users can flexibly use Authing's Open Restful APIs for function expansion to meet the identity management needs of different enterprises under different business scenarios.

Features and Advantages

Authing makes identity management easy.

As an excellent provider of identity management solutions, Authing will bring significant competitive advantages to enterprises in B2B, B2C, B2E or IoT scenarios: reducing development costs, improving security, and boosting production efficiency.

High security

When Authing was launched, it was selected by the China Academy of Information and Communications Technology as an "Innovative Enterprise in the Field of Identity Management and Access Control in China" and was included in the "White Paper on Cyber ​​Security Industry 2019".

  • Visual security audits
  • Multi-factor login
  • Password management
  • Encrypted transmission and storage

Compliance

Authing adheres to the compliance requirements of different countries and industries and strives to create reliable services for customers. At the same time, it actively participates in the formulation and promotion of industry security standards, adheres to the principle that compliance is service, and builds and operates a safe and reliable cloud ecological environment.

Click to see specific protocols Authing adapts to

As an enterprise-level SaaS service and identity service provider that concerns the core secrets of enterprises, Authing always puts security in the first place. Authing has international authoritative security certification and a mature information security management system to secure the whole life cycle of software, with reliable data security protection and round-the-clock security emergency response measures.

ISO Quality System Certification

ISO 9001 quality system certification is the foundation of enterprise development and growth. Authing's acquisition of this certification is a full affirmation of our long-term work in the construction of a privacy compliance system. The Authing security team has been committed to protecting user privacy and data security and providing users with transparent, efficient, safe and reliable services.

GDPR General Data Protection Regulation

The General Data Protection Regulation, referred to as GDPR, is a regulation of the European Union. The predecessor was the "Computer Data Protection Law" formulated by the European Union in 1995. Authing’s data center, management system, R&D, and functional departments have passed this certification, which means that we have been benchmarked with international standards in the field of information security management, have sufficient information security risk identification and control capabilities, and can provide global customers with safe and reliable service.

Authing was included in White Paper on China Cyber Security Industry.

When Authing was first launched, it was selected as an "Innovative Enterprise in Domestic Identity Management and Access Control" by the China Institute of Information and Communications Technology (CIIT) and was included in White Paper on China Cyber Security Industry (2019).

Three levels of protection

Ministry of Public Security Information Security Level 3 Certification GB/T 22239-2008 Information Security Technology Information System. The Basic Requirements for Security Level Protection, referred to as Security Level Protection, is an information security standard issued by the Standardization Administration of China. It is a basic system of information security in China. The level is divided into 1 to 5 levels according to the importance of the information system from low to high, and different security levels implement different protection strategies and requirements.

Authing uses Level 3 information system protection strategy that has been successfully evaluated by a professional evaluation organization. signifies that we have security protection capabilities recognized by the authority in terms of physical, network, host, application and data. And it reached a high level in the industry.

Cover all Wechat using scenario

Authing provides a concise and unified SDK for users in the complex login scenes for WeChat ecosystem. The backend could be automatically processed by three parts -- OpenID, UnionID and mobile phone numbers, to identify the same ID and merge the same accounts. Users only need to call the front-end SDK without worrying about various complex identification logic.

High performance

  • Millisecond query record
  • Millisecond write speed
  • Redundant architecture, redundant storage
  • No single point of failure, high reliability
  • One-click replication of architecture to public cloud / private cloud / private cloud
  • One-click expansion
  • Visual management tools

High productivity

  • Millisecond query record.
  • RESTful, GraphQL, SDK.
  • Interactive, User-Centered, Comprehensive documentation.
  • Support OAuth 2.0, OIDC, SAML, AD/LDAP, WS-Fed.
  • User growth, permission control, SQL or code level data query, log, audit.
  • Plugin, pipeline, domain name, unlimited custom login box (style / layout), multi-database compatibility.
  • Volume deployment, automatic update.

No supplier lock-in

Authing provides a complete and easy data export feature that allows users to completely migrate their data from the platform at any time. Authing does not retain any of the data of users.

  • Authing supports all major protocols in the market such as OIDC, SAML, OAuth, etc., so customers are free to choose.
  • Authing supports a custom authentication process (Pipeline) . Customers can change the authentication process, plug and unplug the required functions, such as the invitation code

Support for private deployments

Authing can provide customized private deployment solutions according to the needs of the enterprise to make identity management easier. Professional technicians are involved throughout the entire process of deploying the solution and providing full customer service after the sale.

Customer success service

Authing supports customization and private deployment. Our team will follow up the whole process of customizing business requirements and deploy local servers for enterprise data security and control. The Customer Success team provides 7*24 hours continuous service from interface interfacing, testing and go-live to later system operation and maintenance, and management platform usage.

Major Functions

Universal login component
The Universal Directory (Guard) is an embeddable login form that can be configured according to your needs and easily add various social login methods, allowing users to log in seamlessly and have a consistent login experience on different platforms.
Universal Directory

The Guard helps developers shield the details of the underlying authentication and tedious UI development. It enables enterprises and developers to quickly launch a secure, customizable UI unified login form.

image

Developers to quickly launch a secure, customizable UI unified login form
  • Account password / phone verification / APP scan code / corporate identity source / social login.
  • Built-in interactive UI for forgetting the password, MFA function, users do not need to write any additional code to complete tasks.
  • Perfectly compatible with mobile and PC, you can easily customize the login box style with CSS.
  • Including login components such as React, Vue, Angular, JavaScript, etc.

Guard can be easily embedded in your apps, customized to enable multiple social providers, and designed according to your brand.

Flexibly define login

If you want to be able to make changes to the existing UI, you can customize it with HTML, CSS and JavaScript.

MFA: Hign security login

MFA is one of the best ways to prevent account theft. If a hacker wants to hack into an account protected by MFA, not only need to steal the credentials, but also need to verify additional factors.

Generally, we see a tendency to use MFA in industries dealing with sensitive data. There is no additional identity layer in these verticals, so there is an urgent need for MFA.

Authing MFA

Authing can centrally configure a variety of authentication factors other than passwords, including dynamic tokens, faces, fingerprints and other biological characteristics. At the same time, it provides a developer API to support other applications to use IDaaS's identity authentication capabilities.

Custom Database Connections

When you want to ensure data security or smoothly migrate users, please use Authing to customize database connections. You can connect to external or local databases maintained by yourself, and you can also migrate existing user data from the old system to Authing.

Custom Database Connections

APN: Authing Partner Network

APN (Authing Partner Network) is an cooperation network provided by Authing. After joining APN, you will be able to experience the following functions:

  • Single sign-on (SSO) capability, which means your customers will be able to log in to your application through a unified entrance and a unified account
  • Make it easier for your customers to find your app, since APN will add your exposure opportunities to your potential partners

Built-with

  1. TypeScript - TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
  2. Nest.js - A progressive Node.js framework.
  3. React.js - A JavaScript library for building user interfaces.
  4. PostgreSQL - A powerful, open source object-relational database system.
  5. Kubernetes - An open-source container orchestration system.
  6. Redis - An open source, in-memory data structure store.
  7. RocketMQ - A distributed messaging and streaming platform.

Start with

To start with, Chinese users please visit docs.authing.cn

For English users, click https://www.authing.cn/developer

Values

IDaaS is an abbreviation of Identity As a Service. Contains all functions of traditional IAM and can bring more benefits to companies: enhance marketing and operational efficiency; Accelerate new business online; enhance safety to reduce network attack risks; enhance user experience.

Operation capacity

The traditional IAM account center has weak operational capabilities, difficult to meet large organizations in business, while IDaaS's multi-tenant operation platform and automation workflow (Workflow) can easily enhance corporate operation efficiency.

Advocacy and scalability

When the number of users continues to rise, the pressure on the user system will continue to increase. The IDaaS of origin cloud can solve this problem, using the Authing IDaaS as an example, with nearly 10 million users per month logging into thousands of systems, with large-scale data processing experience, the digital identity solution built can better support enterprise expansion.

Articles

Founders

Business

Philosophy

Insights

Who uses Authing ?

Community

Chat freely and give us feedback on our forum: https://forum.authing.cn

Email us at [email protected], or ring us at 400-6197-031 for a thorough talk.

Other ways to contact us:

Authing Chatbot:

Scan the qrcode to add administrator to join the WeChat group.:

Contributors


License

Authing is under the MIT license.

MIT is a license agreement as liberal as BSD. You must include the original license agreement in your distribution, regardless of whether you are publishing binary still released in source code.

docs's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

docs's Issues

Feature: Document CSP directives

Description

Many web applications employ a Content Security Policy to restrict which domains or resources can be loaded. It would be nice to document what domains need to be allow-listed in order to allow Authing to work.

For example, necessary CSP directives will need to include at least the following:

  • connect-src: [youraccount].authing.cn core.authing.cn files.authing.co
  • img-src: authing-files.oss-cn-zhangjiakou.aliyuncs.com
  • font-src: at.alicdn.com

I'm not sure if the above list is complete.

Proposed solution

Documenting the full list of origins that need to be added to a web application's Content Security Policy to allow Authing to function.

/api/v3/get-user-action-logs 返回值和文档不一致

反馈模版

/api/v3/get-user-action-logs

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

文档说明eventType筛选和返回是英文枚举
image
但是测试返回是汉字
image

你期望的结果

按文档返回正确格式

文档没讲 authing 中如何创建 GitLab

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

没讲 authing 中如何创建 GitLab,直接让复制链接:

  1. 进入 Gitlab 配置详情页,复制应用访问链接

https://docs.authing.cn/v2/guides/qiwei-sso/

你期望的结果

  1. 在 Authing 控制台「添加集成应用」,选择 GitLab
  2. 进入 Gitlab 配置详情页,复制应用访问链接

无法正常使用 Type 2 授权码 + PKCE 模式

反馈模版

问题分类

  • 步骤说明不清晰/看不懂

请具体描述你的问题

https://docs.authing.cn/v2/apn/more-oidc-tests/type2.html

我尝试使用Type 2 授权码 + PKCE 模式进行测试测试

https://gchq.github.io/CyberChef/#recipe=SHA2('256',64,160)To_Base64('A-Za-z0-9-_')&input=WlROaU1HTTBOREk1T0daak1aVE5pTUdNME5ESTVPR1pqTVpUTmlNR00wTkRJNU9HWmpNWlROaU1HTTBOREk1T0daak0

code_challenge: ZTNiMGM0NDI5OGZjMZTNiMGM0NDI5OGZjMZTNiMGM0NDI5OGZjMZTNiMGM0NDI5OGZjM
code_verifier: NWQxYjJhNTFlMGVmMzQ2OTFiMjBjMGIwN2FmYjJkYzk2NzQ3NzljZjBhYzU2MzZiNjdjODljNzRhZTFjMWY1Yw
code_challenge_method: S256

但是获取token的时候,返回这样的消息
{
"error": "invalid_grant",
"error_description": "code_verifier 验证失败"
}
希望能给予具体生成code_challenge的hash和base64编码的例子(我不知道是生成过程中哪一步出了问题)

SAML2 协议文档错误

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

概念->理解 SAML2 协议->SAML2 流程->SP 与 IdP 之间通信方式->HTTP POST Binding,这一小节中的内容有错,第一句:IdP 通过立即提交的 Form 表单以 POST 请求的方式将 SAML Request 发到 SP。这句话应该是:SP 通过立即提交的 Form 表单以 POST 请求的方式将 SAML Request 发到 IdP。

https://docs.authing.cn/v2/concepts/saml/saml-flow.html

你期望的结果

将该错误内容修改为正确的内容

完善 OIDC 开发文档

建议作出以下调整:

  1. 请求 userInfo 的部分放到各个流程中,不放到最上面,用户进来后第一步想获得的信息是如何发起登录请求,我们需要从用户的角度去思考文档该怎么写
  2. scope 列个列表
  3. 使用不同的 response_type 后控制台中需要作出的对应配置修改

where is your social login?

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

你期望的结果

Node.js SDK 中创建租户时,`logo` 和 `description` 参数与文档描述不一致

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

文档地址:
创建租户

SDK 版本:

    "authing-js-sdk": "^4.23.35"

在创建租户时,logodescription 参数在文档内为可选,实际开发体验时必选,若留空会报 400:参数错误

image

你期望的结果

  1. 希望上述参数与文档一致
  2. tenant 类下的大多数返回值是 any,内测阶段可以理解,预计什么时候能把类型支持一下呢

this SDK is not supported by the compiler

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

Failed to build module 'Authing'; this SDK is not supported by the compiler (the SDK is built with 'Apple Swift version 5.8 (swiftlang-5.8.0.124.2 clang-1403.0.22.11.100)', while this compiler is 'Apple Swift version 5.9.2 (swiftlang-5.9.2.2.56 clang-1500.1.0.2.5)'). Please select a toolchain which matches the SDK.

你期望的结果

文档跳转错误:“SSO综述”跳转“如何创建第一个应用”

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

单点登录 SSO 综述中提到:

如果你还没有创建过应用,可以了解如何创建第一个应用

这里对“如何创建第一个应用”的引用出错了,点开是404。

你期望的结果

不知道实际应该跳到哪里,猜测是 https://docs.authing.cn/v2/guides/app/create-app.html

文档中`${user.gender} ` 的完整字段信息链接有吗?

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

我不知道该如何获取 ${user.gender} 的完整字段信息,例如昵称的字段是啥等等;我需要一份可以使用的完整字段含义表

https://docs.authing.cn/v2/guides/federation/saml.html

你期望的结果

期望文档中给一个一份可以使用的完整字段含义表 的链接地址

《选择合适的权限模型》内容多了一个顿号

《选择合适的权限模型》内容多了一个顿号

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

https://docs.authing.cn/v2/guides/access-control/choose-the-right-access-control-model.html

此页面描述

在 ABAC 的决策语句的执行过程中,决策引擎会根据定义好的决策语句,结合对象、资源、操作、环境等因素动态计算出决策结果。、

最后多了一个顿号。

你期望的结果

在 ABAC 的决策语句的执行过程中,决策引擎会根据定义好的决策语句,结合对象、资源、操作、环境等因素动态计算出决策结果。

测试反馈

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

你期望的结果

Android拼错了😄

反馈模版

问题分类

  • 没找到想了解的信息
  • 步骤说明不清晰/看不懂
  • 内容有错
  • 其他

请具体描述你的问题

你期望的结果

authing saml 作为 身份提供商 遇到的 问题

反馈模版

请具体描述你的问题

假设现在有 2个 SP , sp_a 与 sp_b
authinng saml 这边设置的 默认的 ACS 为 http://sp_a/sso:
此时 从 sp_b 登录的 时候 ACS 地址走了 默认的 sp_a 导致登录失败

你期望的结果

authinng saml 可以同时兼容俩个 sp,自动识别 ACS 地址

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.