Authentication Configuration#

To use an authentication profile you must understand how to create one and configure settings. To get started, use the Admin UI to configure the system, create some authenticators and authenticator actions, and get some initial flows working.

All authenticators and authentication actions can use base configuration settings. The meaning of some settings is quite intricate and can relate to plugin interfaces. Therefore, use the following steps to learn about authentication configuration.


  1. Create an Authentication Profile

    First, follow the Create an Authentication Profile guide to understand the base setup and how to deploy authentication endpoints.

  2. Understand Authentication Endpoints

    Next, read the Endpoints and Base URLs guide to understand the types of authentication endpoint and how they are called.

  3. Use Authenticators

    The Authenticators Home Page summarizes the many possible ways to authenticate users. Run some initial flows to get connected.

  4. Use Authentication Actions

    The Authentication Actions Home Page explains how actions manipulate attributes during user authentication workflows, to enable control over the finer behaviors.

  5. Learn More About Authenticator Configuration

    The Authenticator Base Configuration guide explains common settings that authenticators can use. Read that guide to learn about some additional configuration options for both built-in and custom authenticators.

  6. Learn More About Authentication Action Configuration

    The Authentication Action Base Configuration guide explains common settings that authentication actions can use. Read that guide to learn about some additional configuration options for both built-in and custom authentication actions.

Was this helpful?