Background Introduction
Authentication Sources
Does your enterprise develop or customize multiple application systems for business communication among employees during its growth and exchange?
Do your enterprise employees expect to have multiple authentication methods to choose from when logging into applications?
In addition to enabling unified management of basic user and organizational data, IDaaS can also integrate enterprise applications. After application integration, you can refer to this module to configure multiple authentication methods for the applications. Based on the actual project situation, you can choose to configure the following multiple authentication methods for the applications.
- System Built-in Authentication Sources: The system includes commonly used methods such as account and password, SMS verification, FIDO2-based biometric authentication, and one-click login with mobile number.
- Personal Social Authentication Sources: Authentication through personal social software accounts (such as WeChat, QQ, Weibo, Alipay, etc.) via account and password or QR code scanning login.
- Enterprise Social Authentication Sources: Authentication through enterprise communication software accounts (such as Enterprise WeChat, DingTalk, Feishu, WeLink, etc.) via account and password or QR code scanning login.
- Standard Protocol Authentication Sources: Federated user authentication through different identity providers using international standard protocols, such as SAML, OAuth, OIDC, etc.
