Orchestrating Secure User Login with Authentication Actions

Orchestrating Secure User Login with Authentication Actions

Identity and access management (IAM) aims to give digital entities the right access to the right resources at the right time. One challenge is to identify users based on the digital entity, e.g. when they have several accounts or authentication methods. Another challenge is to meet requirements from business and compliance that may differ depending on various variables. Consequently, simple authentication - if its passwords or passwordless, one or multiple factors - is not enough.

The Curity Identity Server provides authentication actions that allow for a highly customizable flow that covers different aspects of IAM. Authentication actions can operate on and manipulate data created during and after authentication. They are therefore an essential building block for a user-friendly and secure authentication process.

Participants will learn how to:

  • Prevent duplication of user accounts by using account linking techniques;
  • Return custom claims from authentication to applications after login completes;
  • Exclude high privilege claims from access tokens unless strong authentication was used;
  • Improve the login user experience using authentication action flows.

Presented by:

Gary Archer

Gary Archer

Product Marketing Engineer at Curity

Michal Trojanowski

Michal Trojanowski

Product Marketing Engineer at Curity
X IconFollow

Next steps

Start Today

Ready to modernize IAM? Build security and improve ease of use to stay ahead of the competition.